Covert Channels and Information Leakage
In the storage covert channel simulation, how does the sender encode information?
How does the receiver decode information in the storage covert channel?
What system behavior is exploited in a timing covert channel?
Why are timing covert channels difficult to detect in real systems?
What role do system logs play in this experiment?
What conclusion can be drawn when a data transfer is blocked but information is still inferred?