Design and implementation of vulnerability verification framework based on Docker

Vulnerability is an important object in the research of information security, but there are many kinds of vulnerabilities at present, and the verification is complex. In view of the difficulties of building security vulnerabilities and the difficulties of vulnerabilities reappearing, a framework sys...

Full description

Bibliographic Details
Main Authors: Chen Yiming, Kou Xiaoqiang, Wang Yongli
Format: Article
Language:zho
Published: National Computer System Engineering Research Institute of China 2018-11-01
Series:Dianzi Jishu Yingyong
Subjects:
Online Access:http://www.chinaaet.com/article/3000094104