One Definition "Any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." Trusted Computer System Evaluation Criteria, US DoD, 1985.