Analysis and implementation method of program to detect inappropriate information leak | IEEE Conference Publication | IEEE Xplore