Multiple Trojan horse systems and covert channel analysis | IEEE Conference Publication | IEEE Xplore