Logic/Time Bomb

Incomplete Base
Structure: Simple
Description

A logic or time bomb is malicious code intentionally placed within software to trigger harmful actions when a specific condition is met or a predetermined time is reached.

Extended Description

This hidden code acts like a delayed-action trap within an application. When its triggering condition occurs—such as a specific date passing or a particular logical state being reached—it executes a payload designed to disrupt normal operations. This trigger could be embedded in either a replicating piece of malware (like a virus) or a non-replicating malicious component. Once activated, the bomb's payload often aims to cause a denial of service. Common outcomes include crashing the system, corrupting or deleting essential data, or severely degrading performance. Developers should be vigilant for such code in third-party components, during code reviews, and as a potential insider threat, as it represents a deliberate act of sabotage.

Common Consequences 1
Scope: OtherIntegrity

Impact: Varies by ContextAlter Execution Logic

Potential Mitigations 2
Phase: Installation
Always verify the integrity of the product that is being installed.
Phase: Testing
Conduct a code coverage analysis using live testing, then closely inspect any code that is not covered.
Demonstrative Examples 1
Typical examples of triggers include system date or time mechanisms, random number generators, and counters that wait for an opportunity to launch their payload. When triggered, a time-bomb may deny service by crashing the system, deleting files, or degrading system response-time.
References 2
Mobile App Top 10 List
Chris Wysopal
13-12-2010
ID: REF-172
A Taxonomy of Computer Program Security Flaws, with Examples
Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S. Choi
19-11-1993
ID: REF-1431
Applicable Platforms
Languages:
Not Language-Specific : Undetermined
Technologies:
Mobile : Undetermined
Modes of Introduction
Architecture and Design
Implementation
Related Weaknesses
Taxonomy Mapping
  • Landwehr