PUBLICATION: On the feasibility of data exfiltration with storage-device backdoors IBM Research Document