/packages/experimental/AndroidVendorSecurityTool/ |
README | 3 An app developed for removing the recent DroidDream malware
|
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_blocking_page_unittest.cc | 174 // Tests showing a blocking page for a malware page and not proceeding. 176 // Enable malware details. 206 // Tests showing a blocking page for a malware page and then proceeding. 208 // Enable malware reports. 235 // Tests showing a blocking page for a page that contains malware subresources 238 // Enable malware reports. 269 // Tests showing a blocking page for a page that contains malware subresources 272 // Enable malware reports. 299 // Tests showing a blocking page for a page that contains multiple malware 300 // subresources and not proceeding. This just tests that the extra malware [all...] |
safe_browsing_blocking_page.h | 8 // be malicious, either as malware or a phishing page, we show an interstitial 21 // A web page may contain several resources flagged as malware/phishing. This 52 // Shows a blocking page warning the user about phishing/malware for a 107 // SBInterstitial[Phishing|Malware|Multiple][Show|Proceed|DontProceed]. 110 // Checks if we should even show the malware details option. For example, we 115 // pending malware details object, we look at the user's 116 // preferences, and if the option to send malware details is
|
malware_details.h | 9 // A class that encapsulates the detailed malware reports sent when 10 // users opt-in to do so from the malware warning page. 12 // An instance of this class is generated when a malware warning page
|
safe_browsing_blocking_page.cc | 40 // For malware interstitial pages, we link the problematic URL to Google's 53 // URL for the "Learn more" link on the multi threat malware blocking page. 140 // Start computing malware details. They will be sent only 207 bool malware = false; local 225 malware = true; 226 current_error_strings->SetString("type", "malware"); 240 DCHECK(phishing || malware); 242 if (malware && phishing) { 245 // Use the malware headline, it is the scariest one. 252 } else if (malware) { [all...] |
safe_browsing_database_unittest.cc | 298 "www.evil.com/malware.html"); 307 "www.foo.com/malware.html"); 314 "www.whatever.com/malware.html"); 325 // Insert a malware sub chunk. 397 // Insert malware, phish, binurl and bindownload add chunks. 399 "www.evil.com/malware.html"); 407 "www.foo.com/malware.html"); 463 "www.evil.com/malware.html"); 483 "192.168.0.1/malware.html"); 507 GURL("http://www.evil.com/malware.html") [all...] |
protocol_parser_unittest.cc | 337 "i:malware\nsd:21-27,42,171717\n"); 372 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n"; 381 std::string redirects("i:goog-malware-shavar\n" 382 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n" 383 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n" 384 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n" 403 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1"); 405 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2"); 407 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3"); 500 "goog-malware-shavar:19:64\n [all...] |
malware_details_unittest.cc | 37 static const char* kMalwareURL = "http://www.malware.com/"; 49 static const char* kLandingData = "<iframe src='http://www.malware.com'>"; 286 // Tests creating a simple malware report. 317 // Tests creating a simple malware report where the subresource has a 357 // Tests creating a malware report with data from the renderer. 435 // Tests creating a malware report where there are redirect urls to an unsafe
|
chunk_range.h | 7 // The anti-phishing and anti-malware protocol sends ASCII strings of numbers
|
report.proto | 8 // sending detailed malware reports from the safe browsing interstitial page.
|
safe_browsing_database.h | 49 // about phishing and malware urls. The download database contains 147 // Filename for malware and phishing URL database. 292 // For browsing related (phishing and malware URLs) chunks and prefixes.
|
safe_browsing_util_unittest.cc | 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE, 305 EXPECT_EQ(safe_browsing_util::MALWARE, 332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
|
malware_details_cache.h | 9 // A class that gets malware details from the HTTP Cache.
|
safe_browsing_service.h | 6 // anti-malware tables and checking urls against them. 52 BINARY_MALWARE_URL, // Binary url leads to a malware. 53 BINARY_MALWARE_HASH, // Binary hash indicates this is a malware. 250 // Report hits to the unsafe contents (malware, phishing, unsafe download URL)
|
malware_details.cc | 151 DVLOG(1) << "Starting to compute malware details."; 270 DLOG(ERROR) << "Unable to serialize the malware report.";
|
protocol_manager.h | 145 // malware reports. |report| is the serialized report. 247 // Generates URL for reporting malware details for users who opt-in. 406 // malware reports for users who opt-in.
|
safe_browsing_blocking_page_test.cc | 6 // malware and phishing urls. It then uses a real browser to go to 361 GURL malware_url("http://localhost/files/safe_browsing/malware.html"); 388 const char kMalwarePage[] = "files/safe_browsing/malware.html";
|
/external/chromium/crypto/ |
hmac_unittest.cc | 28 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav" 29 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s" 30 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi" 31 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh" 32 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y" 33 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing" 34 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav [all...] |
/external/chromium/chrome/common/safe_browsing/ |
safebrowsing_messages.h | 39 // Send part of the DOM to the browser, to be used in a malware report. 52 // Request a DOM tree when a malware interstitial is shown.
|
csd.proto | 5 // Client side phishing and malware detection request and response
|
/frameworks/base/docs/html/resources/faq/ |
security.jd | 12 <li><a href="#malware">I think I found malicious software being distributed 91 <a name="malware" id="malware"></a><h2>I think I found malicious software being 96 href="http://en.wikipedia.org/wiki/Malware">malware</a>, for Android. If you 97 think somebody is trying to spread malware, please let us know at <a
|
/external/chromium/chrome/browser/download/ |
download_safe_browsing_client.h | 85 // Report malware hits to safebrowsing service. 100 // These URLs are used to report malware to safe browsing service.
|
/external/chromium/chrome/browser/resources/ |
safe_browsing_multiple_threat_block.html | 117 <div class="icon"><img src="shared/images/phishing_icon.png" alt="Malware Icon" onmousedown="return false;"/></div> 126 <td><a href="" onclick="var id= this.getAttribute('chromiumID'); this.getAttribute('chromiumIsMalware') ? showDiagnostic(id) : reportError(id); return false;" jscontent="errorLink" jsvalues="chromiumID:$counter.value;chromiumIsMalware:type=='malware'" jseval="$counter.value++"></a></td>
|
/external/chromium/chrome/browser/history/ |
download_create_info.h | 78 // If safebrowsing believes this URL leads to malware.
|
/packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/ |
AttachmentUtilities.java | 90 * Filename extensions of attachments we're never willing to download (potential malware). 95 // File types that contain malware 100 // File types of common compression/container formats (again, to avoid malware)
|