fsinfo.cs.tu-dortmund.de/_media/studis/ba-david-mehren.pdf
OCI-based Vulnerability Containers with Metadata for Automated Evaluation of Security Analysis Tools
with host isolation.
1.2.2. Software Competitions
The scientific community organizes several competitions on software research topics. Examples are Test‑Comp [10] for software testing,SV‑COMP [11], focu [...] popular way to package, ship and run software and solve different problems: They provide isolation between the host and the running software, they allow shipping software in a de‑ fined, reproducible environment [...] Enumeration (CWE), a list of hardware and software weakness types [27]. For software, CWE categorizes weaknesses that “are frequently used or encountered in software development” [28], e.g. CWE‑89 describes …