{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:40:07Z","timestamp":1756489207527,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,18]],"date-time":"2024-04-18T00:00:00Z","timestamp":1713398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["60NANB24D005"],"award-info":[{"award-number":["60NANB24D005"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,18]]},"DOI":"10.1145\/3603287.3651215","type":"proceedings-article","created":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T12:06:34Z","timestamp":1714219594000},"page":"86-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Genomics Cybersecurity Concerns, Challenges, and a Modular Test Lab"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7909-4217","authenticated-orcid":false,"given":"Jared","family":"Sheldon","sequence":"first","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8672-6496","authenticated-orcid":false,"given":"Scott","family":"Ross","sequence":"additional","affiliation":[{"name":"HudsonAlpha Institute for Biotechnology, Huntsville, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4854-5419","authenticated-orcid":false,"given":"Thomas","family":"Morris","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8820-6448","authenticated-orcid":false,"given":"Isabelle","family":"Brown","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3542-3989","authenticated-orcid":false,"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4922-4026","authenticated-orcid":false,"given":"Patrick","family":"Pape","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, Alabama, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7677-3825","authenticated-orcid":false,"given":"Phillip","family":"Whitlow","sequence":"additional","affiliation":[{"name":"HudsonAlpha Institute for Biotechnology, Huntsville, Alabama, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"volume-title":"Azenta Life Sciences Blog. Azenta US","author":"Sciences Blog Azenta Life","key":"e_1_3_2_1_1_1","unstructured":"Azenta Life Sciences Blog. 2018. Azenta Life Sciences Blog. Azenta US, Inc. https:\/\/www.azenta.com\/blog\/safe-storage-temperatures-biological-materials"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature.2015.17711"},{"key":"e_1_3_2_1_3_1","unstructured":"CVE1517. 2022. CVE-2022-1517. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-1517"},{"key":"e_1_3_2_1_4_1","unstructured":"CVE1518. 2022. CVE-2022-1518. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-1518"},{"key":"e_1_3_2_1_5_1","unstructured":"CVE1519. 2022. CVE-2022-1519. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-1519"},{"key":"e_1_3_2_1_6_1","unstructured":"CVE1521. 2022. CVE-2022-1521. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-1521"},{"key":"e_1_3_2_1_7_1","unstructured":"CVE1524. 2022. CVE-2022-1524. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-1524"},{"key":"e_1_3_2_1_8_1","unstructured":"CVE1966. 2023. CVE-2023-1966. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-1966"},{"key":"e_1_3_2_1_9_1","unstructured":"CVE1968. 2023. CVE-2023-1968. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-1968"},{"key":"e_1_3_2_1_10_1","unstructured":"Existing Workflow Systems. 2023. Existing Workflow Systems. Common Workflow Language. https:\/\/github.com\/common-workflow-language\/common-workflow-language\/wiki\/Existing-Workflow-systems"},{"volume-title":"Genomic Data Science Fact Sheet","author":"Science Fact Sheet Genomic Data","key":"e_1_3_2_1_11_1","unstructured":"Genomic Data Science Fact Sheet. 2022. Genomic Data Science Fact Sheet. National Institutes of Health National Human Genome Research Institute. https:\/\/www.genome.gov\/about-genomics\/fact-sheets\/Genomic-Data-Science"},{"key":"e_1_3_2_1_12_1","unstructured":"Genomic Data Sharing Expectations by NIH Institute and Center. 2023. Genomic Data Sharing Expectations by NIH Institute and Center. National Institutes of Health. https:\/\/sharing.nih.gov\/genomic-data-sharing-policy\/about-genomic-data-sharing\/gds-policy-expectations-by-nih-institute-and-center"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg.2017.113"},{"volume-title":"National Vulnerability Database","author":"National Vulnerability Database. [n.d.].","key":"e_1_3_2_1_14_1","unstructured":"National Vulnerability Database. [n.d.]. National Vulnerability Database. National Institute of Standards and Technology. https:\/\/nvd.nist.gov\/vuln\/search"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17)","author":"Ney Peter","year":"2017","unstructured":"Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, and Tadayoshi Kohno. 2017. Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More. In Proceedings of the 26th USENIX Conference on Security Symposium (SEC'17). USENIX Association, Vancouver, Canada, 765--779."},{"volume-title":"NIH NHGRI Data Sharing Policies and Expectations","author":"Data Sharing Policies NIH NHGRI","key":"e_1_3_2_1_16_1","unstructured":"NIH NHGRI Data Sharing Policies and Expectations. 2023. NIH NHGRI Data Sharing Policies and Expectations. National Institutes of Health National Human Genome Research Institute. https:\/\/www.genome.gov\/about-nhgri\/Policies-Guidance\/Data-Sharing-Policies-and-Expectations"},{"volume-title":"Privacy in Genomics","author":"Genomics Privacy","key":"e_1_3_2_1_17_1","unstructured":"Privacy in Genomics. 2021. Privacy in Genomics. National Institutes of Health National Human Genome Research Institute. https:\/\/www.genome.gov\/about-genomics\/policy-issues\/Privacy"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ronald Pulivarti Natalia Martin Fred Byers Justin Wagner Justin Zook Samantha Maragh Kevin Wilson Martin Wojtyniak Brett Kreider Ann-Marie France Sallie Edwards Tommy Morris Jared Sheldon Scott Ross and Phillip Whitlow. 2023. Cybersecurity of Genomic Data. Technical Report NIST Internal Report (IR) 8432. National Institute of Standards and Technology Gaithersburg MD. https:\/\/doi.org\/10.6028\/NIST.IR.8432","DOI":"10.6028\/NIST.IR.8432"},{"key":"e_1_3_2_1_19_1","unstructured":"Keerthi Rangan. 2022. Why Data Erasure Is Crucial to Protect Sensitive Information. G2. www.g2.com\/articles\/data-erasure"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbioe.2020.591980"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/s10038-020-00862-1"}],"event":{"name":"ACM SE '24: 2024 ACM Southeast Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Marietta GA USA","acronym":"ACM SE '24"},"container-title":["Proceedings of the 2024 ACM Southeast Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651215","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603287.3651215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:05:14Z","timestamp":1756487114000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603287.3651215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":21,"alternative-id":["10.1145\/3603287.3651215","10.1145\/3603287"],"URL":"https:\/\/doi.org\/10.1145\/3603287.3651215","relation":{},"subject":[],"published":{"date-parts":[[2024,4,18]]},"assertion":[{"value":"2024-04-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}