Discovering data leakage sources