The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 09, 2023

Filed:

Jan. 29, 2019
Applicants:

Samsung Electronics Co., Ltd., Suwon-si, KR;

Korea University Research and Business Foundation, Seoul, KR;

Inventors:

Jaewoo Seo, Suwon-si, KR;

Suin Kang, Seoul, KR;

Mincheol Kim, Seoul, KR;

Hyemin Kim, Seoul, KR;

Huykang Kim, Seoul, KR;

Kiseok Do, Suwon-si, KR;

Jooyeon Moon, Seoul, KR;

Hyunmin Song, Seoul, KR;

Sejoon Oh, Seoul, KR;

Sooyeon Lee, Seoul, KR;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 8/53 (2018.01); G06F 18/22 (2023.01); G06V 10/74 (2022.01);
U.S. Cl.
CPC ...
G06F 21/561 (2013.01); G06F 8/53 (2013.01); G06F 18/22 (2023.01); G06F 21/563 (2013.01); G06V 10/761 (2022.01); G06F 2221/033 (2013.01);
Abstract

An electronic device is disclosed. An electronic device according to various embodiments comprises: a processor; and a memory electrically connected to the processor, wherein the processor may be configured to: obtain a plurality of first parameters associated with attributes of at least one malicious code and a plurality of second parameters associated with a system in which the at least one malicious code is executed; obtain a similarity on the basis of a first comparison result according to a first comparison method between the plurality of first parameters and a second comparison result according to a second comparison method between the plurality of second parameters; and classify the at least one malicious code into at least one cluster on the basis of the similarity between the at least one malicious code. Other various embodiments may be provided.


Find Patent Forward Citations

Loading…