Covert channels
All trusted software is assumed to not participate in covert channel schemes. In addition, the software must be designed so that it cannot be utilized by untrusted software to exploit covert channels. This section defines covert channels and gives guidelines for their detection and limitation.