Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules | IEEE Conference Publication | IEEE Xplore