On the feasibility of data exfiltration with storage-device backdoors