Introducing the DRG Challenges!

The Dragon Research Group (DRG) is pleased to kick off another major milestone in the community services we provide. The DRG Challenges page details our foray into the world of information security challenges. We currently have two projects underway. At this year's FIRST 2012 conference, the DRG is sponsoring a live, in-person challenge, the DRG FIRST 2012 Challenge. Check out what the winning team will be awarded for their efforts. It is sure to be heated competition. For those not attending the conference, fret not, we are also sponsoring the HotCRP Challenge aimed to help enhance a widely used conference management software package. We invite you to join the DRG challenges mailing list to discuss these and future DRG challenges.

posted at 5:31 pm | permanent link

DRG is looking to expand again, join us?!

The Dragon Research Group (DRG) is in need of talented and trustworthy individuals who can donate at least 20 hours per month of their spare time to help us make a difference in addressing Internet security issues. We are specifically looking for volunteers who posses the following capabilities:

FreeBSD and GNU/Linux system administration
We are seeking volunteers who are proficient in managing FreeBSD and GNU/Linux systems. Ideally the candidate will be familiar and comfortable setting up and using common monitoring tools, log management applications, backup/restore solutions, database administration, system auditing processes, configuration management and light programming duties using shell or interpreted scripting languages. The ideal candidate should have extensive, remote distributed Unix system administration experience.
Software development
We are seeking volunteers who are proficient in developing various network and security tools. Competency with C/C++ a must. Ability to maintain, debug and learn other languages is desired. The ideal candidate should be capable of socket client and server programming with an emphasis on secure coding practices suitable for widespread public usage and release.
Malware analysis
We are seeking volunteers who are proficient in advanced static and dynamic malware analysis. Competency with common tools such as disassemblers and debuggers as well as x86 assembly instructions and programming a must. The ideal candidate should be capable of developing associated tools suitable for public use and security community release.
Digital media development
We are seeking volunteers who are proficient in creating original digital content including images and video suitable for publication online and in printed materials. An ideal candidate should have experience performing web development in a Unix environment.

If you can help fulfill one or more of the needs above, we want to hear from you. Please visit our Apply to DRG page and submit your application today!

posted at 4:18 pm | permanent link

The DRG Guide to Using PGP

We are happy to release The DRG Guide to Using PGP. The DRG makes extensive use of Pretty Good Privacy (PGP) for a variety of encryption needs. We hope this guide may assist others who want to do the same. We welcome your PGP-encrypted emails in any communications you have with us and we would be happy to participate in PGP key signing events with you. Look for us at your next event. You should be able to download a copy of the DRG PGP public key from this system or find it on one of the many PGP keyservers. Just make sure you have the key id 0x47196BBF. Our key should look like this:

pub   1024D/47196BBF 2009-06-17
      Key fingerprint = C90E 0C2A A629 DF49 959C  D04D 4426 3058 4719 6BBF
uid                  Dragon Research Group 
uid                  Dragon Research Group 
sub   4096g/BBA00357 2009-06-17

posted at 12:00 am | permanent link

About DRG

Apply to DRG

Host a DRG Distro Pod

Insight & Analysis


Weekend Reads


Security Innovation Grant

Mailing lists

DRG PGP public key

Follow us on Twitter Follow DragonResearch on Twitter

Feedback: dragon@dragonresearchgroup.org