ABSTRACT

Contents What Is a Covert Channel? ..................................................................................................... 229 How Is a Covert Channel Exploited? ...................................................................................... 230 How Much Information Can Flow over a Covert Channel? .....................................................231 Example of a Covert Channel ................................................................................................. 232 Overview of the Analysis Process ............................................................................................ 232 Protecting against Covert Channels ........................................................................................ 234 Steganography as a Special Case ............................................................................................. 234 Recommendations ...................................................................................................................235 Further Readings .....................................................................................................................235