HomeSort by relevance Sort by last modified time
    Searched full:malware (Results 1 - 25 of 44) sorted by null

1 2

  /packages/experimental/AndroidVendorSecurityTool/
README 3 An app developed for removing the recent DroidDream malware
  /external/chromium/chrome/browser/safe_browsing/
safe_browsing_blocking_page_unittest.cc 174 // Tests showing a blocking page for a malware page and not proceeding.
176 // Enable malware details.
206 // Tests showing a blocking page for a malware page and then proceeding.
208 // Enable malware reports.
235 // Tests showing a blocking page for a page that contains malware subresources
238 // Enable malware reports.
269 // Tests showing a blocking page for a page that contains malware subresources
272 // Enable malware reports.
299 // Tests showing a blocking page for a page that contains multiple malware
300 // subresources and not proceeding. This just tests that the extra malware
    [all...]
safe_browsing_blocking_page.h 8 // be malicious, either as malware or a phishing page, we show an interstitial
21 // A web page may contain several resources flagged as malware/phishing. This
52 // Shows a blocking page warning the user about phishing/malware for a
107 // SBInterstitial[Phishing|Malware|Multiple][Show|Proceed|DontProceed].
110 // Checks if we should even show the malware details option. For example, we
115 // pending malware details object, we look at the user's
116 // preferences, and if the option to send malware details is
malware_details.h 9 // A class that encapsulates the detailed malware reports sent when
10 // users opt-in to do so from the malware warning page.
12 // An instance of this class is generated when a malware warning page
safe_browsing_blocking_page.cc 40 // For malware interstitial pages, we link the problematic URL to Google's
53 // URL for the "Learn more" link on the multi threat malware blocking page.
140 // Start computing malware details. They will be sent only
207 bool malware = false; local
225 malware = true;
226 current_error_strings->SetString("type", "malware");
240 DCHECK(phishing || malware);
242 if (malware && phishing) {
245 // Use the malware headline, it is the scariest one.
252 } else if (malware) {
    [all...]
safe_browsing_database_unittest.cc 298 "www.evil.com/malware.html");
307 "www.foo.com/malware.html");
314 "www.whatever.com/malware.html");
325 // Insert a malware sub chunk.
397 // Insert malware, phish, binurl and bindownload add chunks.
399 "www.evil.com/malware.html");
407 "www.foo.com/malware.html");
463 "www.evil.com/malware.html");
483 "192.168.0.1/malware.html");
507 GURL("http://www.evil.com/malware.html")
    [all...]
protocol_parser_unittest.cc 337 "i:malware\nsd:21-27,42,171717\n");
372 add_del = "n:1700\nad:1-7,43-597,44444,99999\ni:malware\nsd:4,21-27171717\n";
381 std::string redirects("i:goog-malware-shavar\n"
382 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1\n"
383 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2\n"
384 "u:cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3\n"
403 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_1");
405 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_2");
407 "cache.googlevideo.com/safebrowsing/rd/goog-malware-shavar_s_3");
500 "goog-malware-shavar:19:64\n
    [all...]
malware_details_unittest.cc 37 static const char* kMalwareURL = "http://www.malware.com/";
49 static const char* kLandingData = "<iframe src='http://www.malware.com'>";
286 // Tests creating a simple malware report.
317 // Tests creating a simple malware report where the subresource has a
357 // Tests creating a malware report with data from the renderer.
435 // Tests creating a malware report where there are redirect urls to an unsafe
chunk_range.h 7 // The anti-phishing and anti-malware protocol sends ASCII strings of numbers
report.proto 8 // sending detailed malware reports from the safe browsing interstitial page.
safe_browsing_database.h 49 // about phishing and malware urls. The download database contains
147 // Filename for malware and phishing URL database.
292 // For browsing related (phishing and malware URLs) chunks and prefixes.
safe_browsing_util_unittest.cc 302 EXPECT_TRUE(safe_browsing_util::GetListName(safe_browsing_util::MALWARE,
305 EXPECT_EQ(safe_browsing_util::MALWARE,
332 EXPECT_EQ(0, safe_browsing_util::MALWARE % 2);
malware_details_cache.h 9 // A class that gets malware details from the HTTP Cache.
safe_browsing_service.h 6 // anti-malware tables and checking urls against them.
52 BINARY_MALWARE_URL, // Binary url leads to a malware.
53 BINARY_MALWARE_HASH, // Binary hash indicates this is a malware.
250 // Report hits to the unsafe contents (malware, phishing, unsafe download URL)
malware_details.cc 151 DVLOG(1) << "Starting to compute malware details.";
270 DLOG(ERROR) << "Unable to serialize the malware report.";
protocol_manager.h 145 // malware reports. |report| is the serialized report.
247 // Generates URL for reporting malware details for users who opt-in.
406 // malware reports for users who opt-in.
safe_browsing_blocking_page_test.cc 6 // malware and phishing urls. It then uses a real browser to go to
361 GURL malware_url("http://localhost/files/safe_browsing/malware.html");
388 const char kMalwarePage[] = "files/safe_browsing/malware.html";
  /external/chromium/crypto/
hmac_unittest.cc 28 "n:1896\ni:goog-malware-shavar\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav"
29 "ar_s_445-450\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_439-444\nu:s"
30 ".ytimg.com/safebrowsing/rd/goog-malware-shavar_s_437\nu:s.ytimg.com/safebrowsi"
31 "ng/rd/goog-malware-shavar_s_436\nu:s.ytimg.com/safebrowsing/rd/goog-malware-sh"
32 "avar_s_433-435\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shavar_s_431\nu:s.y"
33 "timg.com/safebrowsing/rd/goog-malware-shavar_s_430\nu:s.ytimg.com/safebrowsing"
34 "/rd/goog-malware-shavar_s_429\nu:s.ytimg.com/safebrowsing/rd/goog-malware-shav
    [all...]
  /external/chromium/chrome/common/safe_browsing/
safebrowsing_messages.h 39 // Send part of the DOM to the browser, to be used in a malware report.
52 // Request a DOM tree when a malware interstitial is shown.
csd.proto 5 // Client side phishing and malware detection request and response
  /frameworks/base/docs/html/resources/faq/
security.jd 12 <li><a href="#malware">I think I found malicious software being distributed
91 <a name="malware" id="malware"></a><h2>I think I found malicious software being
96 href="http://en.wikipedia.org/wiki/Malware">malware</a>, for Android. If you
97 think somebody is trying to spread malware, please let us know at <a
  /external/chromium/chrome/browser/download/
download_safe_browsing_client.h 85 // Report malware hits to safebrowsing service.
100 // These URLs are used to report malware to safe browsing service.
  /external/chromium/chrome/browser/resources/
safe_browsing_multiple_threat_block.html 117 <div class="icon"><img src="shared/images/phishing_icon.png" alt="Malware Icon" onmousedown="return false;"/></div>
126 <td><a href="" onclick="var id= this.getAttribute('chromiumID'); this.getAttribute('chromiumIsMalware') ? showDiagnostic(id) : reportError(id); return false;" jscontent="errorLink" jsvalues="chromiumID:$counter.value;chromiumIsMalware:type=='malware'" jseval="$counter.value++"></a></td>
  /external/chromium/chrome/browser/history/
download_create_info.h 78 // If safebrowsing believes this URL leads to malware.
  /packages/apps/Email/emailcommon/src/com/android/emailcommon/utility/
AttachmentUtilities.java 90 * Filename extensions of attachments we're never willing to download (potential malware).
95 // File types that contain malware
100 // File types of common compression/container formats (again, to avoid malware)

Completed in 489 milliseconds

1 2