US 11,809,550 B2
Electronic device and control method therefor
Sungbae Yoo, Suwon-si (KR)
Assigned to Samsung Electronics Co., Ltd., Suwon-si (KR)
Appl. No. 17/286,998
Filed by Samsung Electronics Co., Ltd., Suwon-si (KR)
PCT Filed Sep. 11, 2019, PCT No. PCT/KR2019/011792
§ 371(c)(1), (2) Date Apr. 20, 2021,
PCT Pub. No. WO2020/105854, PCT Pub. Date May 28, 2020.
Claims priority of application No. 10-2018-0142782 (KR), filed on Nov. 19, 2018.
Prior Publication US 2021/0390176 A1, Dec. 16, 2021
Int. Cl. G06F 21/00 (2013.01); G06F 21/54 (2013.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01)
CPC G06F 21/54 (2013.01) [G06F 21/554 (2013.01); G06F 21/572 (2013.01)] 11 Claims
OG exemplary drawing
 
1. An electronic device comprising:
a memory configured to store a kernel and at least one application; and
a processor configured to, based on a system call generated by a process executed by the application being transmitted to the kernel, execute the application to cause the application to perform an operation corresponding to a request generated by the kernel based on the system call,
wherein the kernel is configured to perform an audit for the system call based on a plurality of predefined rules,
wherein the processor is further configured to:
generate a first rule to identify a point in time of a system call generated by the application to perform the process,
identify whether the application corresponds to a security-verified application based on the first rule,
based on the application corresponding to the security-verified application, generate a second rule to skip the audit based on the plurality of predefined rules,
perform security verification for at least one application stored in the memory,
generate a list including information about the at least one security-verified application, among the at least one application,
store the list in the memory,
generate a third rule to monitor modulation for at least one security-verified application stored in the list, and
based on modulation for the application being identified according to the third rule, delete information about the application of which modulation is identified from the list, and
wherein the modulation of the application is a modulation of binary code of the file associated with execution of the application is changed by an unauthorized user or system.