Abstract
Robotic liquid handlers save human effort and are, in many cases, faster and more precise than a human operator. They can be operated and controlled remotely and do not require technical programming skills from their operators. Unfortunately, like many other high-tech products, robotic wet lab automation may have exploitable vulnerabilities and design weaknesses that allow subversion by an adversary. The distributed nature and remote control capabilities of wet lab automation expand its attack surface increasing the opportunities for an attack to interfere with the executed biological protocols, affect medical products, and alter test results. Perimeter defenses are known to be insufficient for proper protection of systems. Security needs to be considered throughout the entire pipeline of wet lab operations, including machinery, local- and cloud-based software, and even biological protocols. In this chapter, we review the most prominent types of robots in a biological laboratory through the lens of cyber-biosecurity and map the general attack surface of wet lab automation.
Original language | English |
---|---|
Title of host publication | Cyberbiosecurity |
Subtitle of host publication | A New Field to Deal with Emerging Threats |
Publisher | Springer International Publishing |
Pages | 279-304 |
Number of pages | 26 |
ISBN (Electronic) | 9783031260346 |
ISBN (Print) | 9783031260339 |
DOIs | |
State | Published - 1 Jan 2023 |
Keywords
- Cyberbiosecurity
- Cybersecurity
- Laboratory automation
- Liquid handlers
ASJC Scopus subject areas
- General Medicine
- General Engineering
- General Biochemistry, Genetics and Molecular Biology
- General Agricultural and Biological Sciences