A presentation about Covert Channels using a File Lock attribute.
The goal of the presentation was to answer 4 questions:
1) How does the covert channel work?
2) What is the likely bandwidth of the channel?
3) What are the major challenges that would arise in implementation of the channel?
4) What security control mechanisms could be used to prevent/detect this type of covert channel?
Presentation was made for a module "Topics in Privacy and Security" at the University of York in January 2015.