Information leakage and steganography: detecting and blocking covert channels