The software contains code that is designed to disrupt the legitimate operation of the software (or its environment) when a certain time passes, or when a certain logical condition is met.
When the time bomb or logic bomb is detonated, it may perform a denial of service such as crashing the system, deleting critical data, or degrading system response time. This bomb might be placed within either a replicating or non-replicating Trojan horse.
Time of Introduction
Architecture and Design
Technical Impact: Varies by context; Alter execution
Typical examples of triggers include system date or time mechanisms,
random number generators, and counters that wait for an opportunity to
launch their payload. When triggered, a time-bomb may deny service by
crashing the system, deleting files, or degrading system
Always verify the integrity of the software that is being
Conduct a code coverage analysis using live testing, then closely
inspect any code that is not covered.