logic bomb

(redirected from Malicious logic)
Also found in: Thesaurus, Encyclopedia.

logic bomb

n.
A computer virus that remains hidden until it is triggered when certain specific conditions are met.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.

logic bomb

n
(Computer Science) computing an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014

log′ic bomb`


n.
an illegal computer program intended to do damage locally under certain circumstances.
Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.logic bomb - a set of instructions inserted into a program that are designed to execute (or `explode') if a particular condition is satisfied; when exploded it may delete or corrupt data, or print a spurious message, or have other harmful effects; "a disgruntled employee planted a logic bomb"
malevolent program - a computer program designed to have undesirable or harmful effects
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
Translations
bombe programmée
References in periodicals archive ?
Therefore, in many cases, the attacker is unlikely to modify the original behaviors of [app.sub.x] while embedding the malicious logic into [app.sub.x].
While attackers generated some of this malware from scratch, in many cases, they infected users by inserting malicious logic into existing legitimate applications.
Home use of the antivirus products will not only protect personal computers at home, but will also potentially lessen the threat of employees bringing malicious logic into work and compromising DOD networks.