{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T14:18:11Z","timestamp":1715782691372},"reference-count":48,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"3","license":[{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>DNA sequencing is the molecular-to-digital conversion of DNA molecules, which are made up of a linear sequence of bases (A,C,G,T), into digital information. Central to this conversion are specialized fluidic devices, called sequencing flow cells, that distribute DNA onto a surface where the molecules can be read. As more computing becomes integrated with physical systems, we set out to explore how sequencing flow cell architecture can affect the security and privacy of the sequencing process and downstream data analysis. In the course of our investigation, we found that the unusual nature of molecular processing and flow cell design contributes to two security and privacy issues. First, DNA molecules are \u2018sticky\u2019 and stable for long periods of time. In a manner analogous to data recovery from discarded hard drives, we hypothesized that residual DNA attached to used flow cells could be collected and re-sequenced to recover a significant portion of the previously sequenced data. In experiments we were able to recover over 23.4% of a previously sequenced genome sample and perfectly decode image files encoded in DNA, suggesting that flow cells may be at risk of data recovery attacks. Second, we hypothesized that methods used to simultaneously sequence separate DNA samples together to increase sequencing throughput (multiplex sequencing), which incidentally leaks small amounts of data between samples, could cause data corruption and allow samples to adversarially manipulate sequencing data. We find that a maliciously crafted synthetic DNA sample can be used to alter targeted genetic variants in other samples using this vulnerability. Such a sample could be used to corrupt sequencing data or even be spiked into tissue samples, whenever untrusted samples are sequenced together. Taken together, these results suggest that, like many computing boundaries, the molecular-to-digital interface raises potential issues that should be considered in future sequencing and molecular sensing systems, especially as they become more ubiquitous.<\/jats:p>","DOI":"10.2478\/popets-2021-0054","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T01:50:45Z","timestamp":1619661045000},"page":"413-432","source":"Crossref","is-referenced-by-count":2,"title":["DNA Sequencing Flow Cells and the Security of the Molecular-Digital Interface"],"prefix":"10.56553","volume":"2021","author":[{"given":"Peter","family":"Ney","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"Lee","family":"Organick","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Jeff","family":"Nivala","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Luis","family":"Ceze","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"35752","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"key":"2022042309263481537_j_popets-2021-0054_ref_001_w2aab3b7c42b1b6b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"[1] Joel Armstrong, Ian T. Fiddes, Mark Diekhans, and Benedict Paten. Whole-Genome Alignment and Comparative Annotation. Annual Review of Animal Biosciences, 2019.10.1146\/annurev-animal-020518-115005645074530379572","DOI":"10.1146\/annurev-animal-020518-115005"},{"key":"2022042309263481537_j_popets-2021-0054_ref_002_w2aab3b7c42b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] Alessandro Barenghi, Luca Breveglieri, Israel Koren, and David Naccache. Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proceedings of the IEEE, 100(11):3056\u20133076, 2012.","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"2022042309263481537_j_popets-2021-0054_ref_003_w2aab3b7c42b1b6b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"[3] Zachary S Bohannan and Antonina Mitrofanova. Calling variants in the clinic: Informed variant calling decisions based on biological, clinical, and laboratory variables. Computational and structural biotechnology journal, 2019.10.1016\/j.csbj.2019.04.002648243131049166","DOI":"10.1016\/j.csbj.2019.04.002"},{"key":"2022042309263481537_j_popets-2021-0054_ref_004_w2aab3b7c42b1b6b1ab1ab4Aa","doi-asserted-by":"crossref","unstructured":"[4] Luis Ceze, Jeff Nivala, and Karin Strauss. Molecular digital data storage using DNA. Nature Reviews Genetics, 2019.10.1038\/s41576-019-0125-331068682","DOI":"10.1038\/s41576-019-0125-3"},{"key":"2022042309263481537_j_popets-2021-0054_ref_005_w2aab3b7c42b1b6b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"[5] Weida D. Chen, A. Xavier Kohll, Bichlien H. Nguyen, Julian Koch, Reinhard Heckel, et al. Combining Data Longevity with High Storage Capacity\u2014Layer-by-Layer DNA Encapsulated in Magnetic Nanoparticles. Advanced Functional Materials, 2019.10.1002\/adfm.201901672","DOI":"10.1002\/adfm.201901672"},{"key":"2022042309263481537_j_popets-2021-0054_ref_006_w2aab3b7c42b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] George M Church, Yuan Gao, and Sriram Kosuri. Next-generation digital information storage in dna. Science, 337(6102):1628\u20131628, 2012.10.1126\/science.122635522903519","DOI":"10.1126\/science.1226355"},{"key":"2022042309263481537_j_popets-2021-0054_ref_007_w2aab3b7c42b1b6b1ab1ab7Aa","doi-asserted-by":"crossref","unstructured":"[7] Maura Costello, Mark Fleharty, Justin Abreu, Yossi Farjoun, Steven Ferriera, et al. Characterization and remediation of sample index swaps by non-redundant dual indexing on massively parallel sequencing platforms. BMC genomics, 19(1):332, 2018.10.1186\/s12864-018-4703-0594178329739332","DOI":"10.1186\/s12864-018-4703-0"},{"key":"2022042309263481537_j_popets-2021-0054_ref_008_w2aab3b7c42b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] Yaniv Erlich, Tal Shor, Itsik Pe\u2019er, and Shai Carmi. Identity inference of genomic data using long-range familial searches. Science, 362(6415):690\u2013694, 2018.10.1126\/science.aau4832754954630309907","DOI":"10.1126\/science.aau4832"},{"key":"2022042309263481537_j_popets-2021-0054_ref_009_w2aab3b7c42b1b6b1ab1ab9Aa","doi-asserted-by":"crossref","unstructured":"[9] Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William H Grover, Philip Brisk, and Mohammad Abdullah Al Faruque. Oligo-snoop: A noninvasive side channel attack against dna synthesis machines. In NDSS, 2019.10.14722\/ndss.2019.23544","DOI":"10.14722\/ndss.2019.23544"},{"key":"2022042309263481537_j_popets-2021-0054_ref_010_w2aab3b7c42b1b6b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] Iliya Fayans, Yair Motro, Lior Rokach, Yossi Oren, and Jacob Moran-Gilad. Cyber security threats in the microbial genomics era: implications for public health. Eurosurveil-lance, 25(6):1900574, 2020.","DOI":"10.2807\/1560-7917.ES.2020.25.6.1900574"},{"key":"2022042309263481537_j_popets-2021-0054_ref_011_w2aab3b7c42b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"[11] Simson L Garfinkel. Forensic feature extraction and cross-drive analysis. digital investigation, 3:71\u201381, 2006.10.1016\/j.diin.2006.06.007","DOI":"10.1016\/j.diin.2006.06.007"},{"key":"2022042309263481537_j_popets-2021-0054_ref_012_w2aab3b7c42b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"[12] Simson L Garfinkel and Abhi Shelat. Remembrance of data passed: A study of disk sanitization practices. IEEE Security & Privacy, 1(1):17\u201327, 2003.","DOI":"10.1109\/MSECP.2003.1176992"},{"key":"2022042309263481537_j_popets-2021-0054_ref_013_w2aab3b7c42b1b6b1ab1ac13Aa","unstructured":"[13] GM12878. Coriell Institute. https:\/\/www.coriell.org\/0\/Sections\/Search\/Sample_Detail.aspx?Ref=GM12878."},{"key":"2022042309263481537_j_popets-2021-0054_ref_014_w2aab3b7c42b1b6b1ab1ac14Aa","doi-asserted-by":"crossref","unstructured":"[14] Nick Goldman, Paul Bertone, Siyuan Chen, Christophe Dessimoz, Emily M. Leproust, Botond Sipos, and Ewan Birney. Towards practical, high-capacity, low-maintenance information storage in synthesized DNA. Nature, 2013.10.1038\/nature11875367295823354052","DOI":"10.1038\/nature11875"},{"key":"2022042309263481537_j_popets-2021-0054_ref_015_w2aab3b7c42b1b6b1ab1ac15Aa","unstructured":"[15] Peter Gutmann. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the Sixth USENIX Security Symposium, San Jose, CA, volume 14, pages 77\u201389, 1996."},{"key":"2022042309263481537_j_popets-2021-0054_ref_016_w2aab3b7c42b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] J Alex Halderman, Seth D Schoen, Nadia Heninger, William Clarkson, William Paul, et al. Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 52(5):91\u201398, 2009.","DOI":"10.1145\/1506409.1506429"},{"key":"2022042309263481537_j_popets-2021-0054_ref_017_w2aab3b7c42b1b6b1ab1ac17Aa","unstructured":"[17] Matthew Herper. Ancestry launches consumer genetics tests for health, intensifying rivalry with 23andme. Stat, October 16, 2019."},{"key":"2022042309263481537_j_popets-2021-0054_ref_018_w2aab3b7c42b1b6b1ab1ac18Aa","unstructured":"[18] Sequencing coverage for NGS experiments. Illumina. https:\/\/www.illumina.com\/science\/technology\/next-generation-sequencing\/plan-experiments\/coverage.html."},{"key":"2022042309263481537_j_popets-2021-0054_ref_019_w2aab3b7c42b1b6b1ab1ac19Aa","unstructured":"[19] Truesight cystic fibrosis data sheet. Illumina."},{"key":"2022042309263481537_j_popets-2021-0054_ref_020_w2aab3b7c42b1b6b1ab1ac20Aa","unstructured":"[20] Ampliseq for illumina BRCA panel reference guide. Illumina, 2019."},{"key":"2022042309263481537_j_popets-2021-0054_ref_021_w2aab3b7c42b1b6b1ab1ac21Aa","unstructured":"[21] Ampliseq for illumina exome panel reference guide. Illumina, 2019."},{"key":"2022042309263481537_j_popets-2021-0054_ref_022_w2aab3b7c42b1b6b1ab1ac22Aa","unstructured":"[22] Effects of index misassignment on multiplexing and downstream analysis, 2020. https:\/\/www.illumina.com\/content\/dam\/illumina-marketing\/documents\/products\/whitepapers\/index-hopping-white-paper-770-2017-004.pdf. Accessed: 2020-06-12."},{"key":"2022042309263481537_j_popets-2021-0054_ref_023_w2aab3b7c42b1b6b1ab1ac23Aa","doi-asserted-by":"crossref","unstructured":"[23] Moshe Karni, Dolev Zidon, Pazit Polak, Zeev Zalevsky, and Orit Shefi. Thermal degradation of DNA. DNA and Cell Biology, 2013.10.1089\/dna.2013.205623621849","DOI":"10.1089\/dna.2013.2056"},{"key":"2022042309263481537_j_popets-2021-0054_ref_024_w2aab3b7c42b1b6b1ab1ac24Aa","doi-asserted-by":"crossref","unstructured":"[24] Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk Lee, Chris Wilkerson, Konrad Lai, and Onur Mutlu. Flipping bits in memory without accessing them: An experimental study of dram disturbance errors. ACM SIGARCH Computer Architecture News, 42(3):361\u2013372, 2014.","DOI":"10.1145\/2678373.2665726"},{"key":"2022042309263481537_j_popets-2021-0054_ref_025_w2aab3b7c42b1b6b1ab1ac25Aa","doi-asserted-by":"crossref","unstructured":"[25] Martin Kircher, Susanna Sawyer, and Matthias Meyer. Double indexing overcomes inaccuracies in multiplex sequencing on the Illumina platform. Nucleic acids research, 40(1), 2012.10.1093\/nar\/gkr771324594722021376","DOI":"10.1093\/nar\/gkr771"},{"key":"2022042309263481537_j_popets-2021-0054_ref_026_w2aab3b7c42b1b6b1ab1ac26Aa","doi-asserted-by":"crossref","unstructured":"[26] Qiaoling Li, Xia Zhao, Wenwei Zhang, Lin Wang, Jingjing Wang, et al. Reliable multiplex sequencing with rare index mis-assignment on DNB-based NGS platform. BMC genomics, 20(1):215, 2019.10.1186\/s12864-019-5569-5641693330866797","DOI":"10.1186\/s12864-019-5569-5"},{"key":"2022042309263481537_j_popets-2021-0054_ref_027_w2aab3b7c42b1b6b1ab1ac27Aa","doi-asserted-by":"crossref","unstructured":"[27] Laura E MacConaill, Robert T Burns, Anwesha Nag, Haley A Coleman, Michael K Slevin, et al. Unique, dual-indexed sequencing adapters with umis effectively eliminate index cross-talk and significantly improve sensitivity of massively parallel sequencing. BMC genomics, 19(1):30, 2018.10.1186\/s12864-017-4428-5575920129310587","DOI":"10.1186\/s12864-017-4428-5"},{"key":"2022042309263481537_j_popets-2021-0054_ref_028_w2aab3b7c42b1b6b1ab1ac28Aa","doi-asserted-by":"crossref","unstructured":"[28] Matthias Meyer and Martin Kircher. Illumina sequencing library preparation for highly multiplexed target capture and sequencing. Cold Spring Harbor Protocols, 2010(6), 2010.10.1101\/pdb.prot544820516186","DOI":"10.1101\/pdb.prot5448"},{"key":"2022042309263481537_j_popets-2021-0054_ref_029_w2aab3b7c42b1b6b1ab1ac29Aa","doi-asserted-by":"crossref","unstructured":"[29] Matthias Meyer, Udo Stenzel, Sean Myles, Kay Pr\u00fcfer, and Michael Hofreiter. Targeted high-throughput sequencing of tagged nucleic acid samples. Nucleic Acids Research, 35(15), 2007.10.1093\/nar\/gkm566197644717670798","DOI":"10.1093\/nar\/gkm566"},{"key":"2022042309263481537_j_popets-2021-0054_ref_030_w2aab3b7c42b1b6b1ab1ac30Aa","doi-asserted-by":"crossref","unstructured":"[30] Abhishek Mitra, Magdalena Skrzypczak, Krzysztof Ginalski, and Maga Rowicka. Strategies for achieving high sequencing accuracy for low diversity samples and avoiding sample bleeding using Illumina platform. PloS one, 10(4), 2015.10.1371\/journal.pone.0120520439329825860802","DOI":"10.1371\/journal.pone.0120520"},{"key":"2022042309263481537_j_popets-2021-0054_ref_031_w2aab3b7c42b1b6b1ab1ac31Aa","unstructured":"[31] Why do i need to return my flow cells? Nanopore. https:\/\/store.nanoporetech.com\/us\/nanohelp\/faq\/why-do-i-need-to-return-my-flow-cells."},{"key":"2022042309263481537_j_popets-2021-0054_ref_032_w2aab3b7c42b1b6b1ab1ac32Aa","unstructured":"[32] New kit extends yields of flow cells. https:\/\/nanoporetech.com\/about-us\/news\/new-kit-extends-yields-flow-cells. Accessed: 2020-06-12."},{"key":"2022042309263481537_j_popets-2021-0054_ref_033_w2aab3b7c42b1b6b1ab1ac33Aa","unstructured":"[33] Peter Ney, Karl Koscher, Lee Organick, Luis Ceze, and Tadayoshi Kohno. Computer security, privacy, and DNA sequencing: Compromising computers with synthesized DNA, privacy leaks, and more. In 26th USENIX Security Symposium (USENIX Security 17), pages 765\u2013779, Vancouver, BC, 2017. USENIX Association."},{"key":"2022042309263481537_j_popets-2021-0054_ref_034_w2aab3b7c42b1b6b1ab1ac34Aa","unstructured":"[34] Novaseq system specifications. https:\/\/www.illumina.com\/systems\/sequencing-platforms\/novaseq\/specifications.html. Accessed: 2020-06-11."},{"key":"2022042309263481537_j_popets-2021-0054_ref_035_w2aab3b7c42b1b6b1ab1ac35Aa","doi-asserted-by":"crossref","unstructured":"[35] Lee Organick, Siena Dumas Ang, Yuan Jyue Chen, Randolph Lopez, Sergey Yekhanin, et al. Random access in large-scale DNA data storage. Nature Biotechnology, 2018.10.1038\/nbt.407929457795","DOI":"10.1038\/nbt.4079"},{"key":"2022042309263481537_j_popets-2021-0054_ref_036_w2aab3b7c42b1b6b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] Lee Organick, Yuan Jyue Chen, Siena Dumas Ang, Randolph Lopez, Xiaomeng Liu, et al. Probing the physical limits of reliable DNA data retrieval. Nature Communications, 2020.10.1038\/s41467-020-14319-8699269932001691","DOI":"10.1038\/s41467-020-14319-8"},{"key":"2022042309263481537_j_popets-2021-0054_ref_037_w2aab3b7c42b1b6b1ab1ac37Aa","unstructured":"[37] Smrt cell 8m tray safety data sheet. PacBio, 2019. https:\/\/www.pacb.com\/wp-content\/uploads\/SDS-SMRT-Cell-8M-Tray.pdf."},{"key":"2022042309263481537_j_popets-2021-0054_ref_038_w2aab3b7c42b1b6b1ab1ac38Aa","doi-asserted-by":"crossref","unstructured":"[38] Brent S Pedersen and Aaron R Quinlan. Mosdepth: quick coverage calculation for genomes and exomes. Bioinformatics, 34(5):867\u2013868, 2018.","DOI":"10.1093\/bioinformatics\/btx699"},{"key":"2022042309263481537_j_popets-2021-0054_ref_039_w2aab3b7c42b1b6b1ab1ac39Aa","unstructured":"[39] A. M. Prince and L. Andrus. PCR: How to kill unwanted DNA. BioTechniques, 1992."},{"key":"2022042309263481537_j_popets-2021-0054_ref_040_w2aab3b7c42b1b6b1ab1ac40Aa","doi-asserted-by":"crossref","unstructured":"[40] Joel Reardon, David Basin, and Srdjan Capkun. Sok: Secure data deletion. In 2013 IEEE symposium on security and privacy, pages 301\u2013315. IEEE, 2013.10.1109\/SP.2013.28","DOI":"10.1109\/SP.2013.28"},{"key":"2022042309263481537_j_popets-2021-0054_ref_041_w2aab3b7c42b1b6b1ab1ac41Aa","unstructured":"[41] Antonio Regalado. China\u2019s bgi says it can sequence a genome for just $100. MIT Technology Review, February 26, 2020. https:\/\/www.technologyreview.com\/2020\/02\/26\/905658\/china-bgi-100-dollar-genome\/. Accessed: 2020-06-12."},{"key":"2022042309263481537_j_popets-2021-0054_ref_042_w2aab3b7c42b1b6b1ab1ac42Aa","doi-asserted-by":"crossref","unstructured":"[42] Garrett J Schumacher, Sterling Sawaya, Demetrius Nelson, and Aaron J Hansen. Genetic information insecurity as state of the art. bioRxiv, 2020.10.1101\/2020.07.08.192666","DOI":"10.1101\/2020.07.08.192666"},{"key":"2022042309263481537_j_popets-2021-0054_ref_043_w2aab3b7c42b1b6b1ab1ac43Aa","doi-asserted-by":"crossref","unstructured":"[43] Rahul Sinha, Geoff Stanley, Gunsagar Singh Gulati, Camille Ezran, Kyle Joseph Travaglini, et al. Index switching causes \u201cspreading-of-signal\u201d among multiplexed samples in Illumina HiSeq 4000 DNA sequencing. BioRxiv, 2017. https:\/\/doi.org\/10.1101\/125724.10.1101\/125724","DOI":"10.1101\/125724"},{"key":"2022042309263481537_j_popets-2021-0054_ref_044_w2aab3b7c42b1b6b1ab1ac44Aa","doi-asserted-by":"crossref","unstructured":"[44] Wendy Weijia Soon, Manoj Hariharan, and Michael P Snyder. High-throughput sequencing for biology and medicine. Molecular systems biology, 9(1), 2013.10.1038\/msb.2012.61356426023340846","DOI":"10.1038\/msb.2012.61"},{"key":"2022042309263481537_j_popets-2021-0054_ref_045_w2aab3b7c42b1b6b1ab1ac45Aa","unstructured":"[45] Julie Utterback. Illumina remains the clear leader of the genomic sequencing market. Morningstar, April 30, 2020."},{"key":"2022042309263481537_j_popets-2021-0054_ref_046_w2aab3b7c42b1b6b1ab1ac46Aa","doi-asserted-by":"crossref","unstructured":"[46] Erik Scott Wright and Kalin Horen Vetsigian. Quality filtering of Illumina index reads mitigates sample cross-talk. BMC genomics, 17(1):876, 2016.10.1186\/s12864-016-3217-x509735427814679","DOI":"10.1186\/s12864-016-3217-x"},{"key":"2022042309263481537_j_popets-2021-0054_ref_047_w2aab3b7c42b1b6b1ab1ac47Aa","unstructured":"[47] Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, and Radu Teodorescu. One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation. In 25th USENIX Security Symposium (USENIX Security 16), pages 19\u201335, 2016."},{"key":"2022042309263481537_j_popets-2021-0054_ref_048_w2aab3b7c42b1b6b1ab1ac48Aa","doi-asserted-by":"crossref","unstructured":"[48] Yinqian Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. Cross-vm side channels and their use to extract private keys. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 305\u2013316, 2012.10.1145\/2382196.2382230","DOI":"10.1145\/2382196.2382230"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2021-0054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:31:36Z","timestamp":1658334696000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2021\/popets-2021-0054.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,27]]},"references-count":48,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,4,27]]},"published-print":{"date-parts":[[2021,7,1]]}},"alternative-id":["10.2478\/popets-2021-0054"],"URL":"https:\/\/doi.org\/10.2478\/popets-2021-0054","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,27]]}}}