On the identification of covert storage channels in secure systems | IEEE Journals & Magazine | IEEE Xplore