Covert Data Exfiltration Using Light and Power Channels | IEEE Conference Publication | IEEE Xplore