Auditing the use of covert storage channels in secure systems | IEEE Conference Publication | IEEE Xplore