Covert Channels and Information Leakage
What is a covert channel in a computer system?
Which of the following best describes information leakage?
What is the key characteristic of a storage covert channel?
In this experiment, how is the storage covert channel implemented?
What is the defining feature of a timing covert channel?
Why are timing covert channels difficult to detect?