Publications by categories in reversed chronological order. (* with equal contribution)
Publications by categories in reversed chronological order. (* with equal contribution)
[1] Jian Cui*, Mingming Zha*, XiaoFeng Wang, Xiaojing Liao, "The Odyssey of robots.txt Governance: Measuring Convention Implications of Web Bots in Large Language Model Services", ACM CCS'25, 2025. (Distinguished Paper Award) [PDF][Code][Page] ๐ Artifact Available, ๐ Artifact Functional, ๐ Results Reproduced
[2] Mingming Zha, Zilong Lin, Siyuan Tang, Xiaojing Liao, Yuhong Nan, Xiaofeng Wang, "Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion", ACM CCS'24, 2024. [PDF][Code]๐ Artifact Available
[3] Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, Baoxu Liu, "Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning", USENIX Security'23, 2023. [PDF] [Page]
[4] Mingming Zha*, Jice Wang*, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang, "Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems", NDSS'22, 2022. [PDF] [Code][Page]
[5] Han Liu, Zhiyuan Yu, Mingming Zha, XiaoFeng Wang, William Yeoh, Yevgeniy Vorobeychik, Ning Zhang, "When Evil Calls : Targeted Adversarial Voice over IP-Telephony Network", ACM CCS'22, 2022. [PDF][Page]
[6] Yi Chen, Di Tang, Yepeng Yao, Mingming Zha, Xiaofeng Wang, Xiaozhong Liu, Haixu Tang, Dongfang Zhao, "Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests", USENIX Security '22, 2022 [PDF][Page]
[7] Zhi Li, Weijie Liu, Hongbo Chen, Xiaofeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou, "Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms", IEEE S&P'22, 2022 [PDF] [Page]
[8] Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Ya Su, Yuan Tian, Kai Chen, Xiaofeng Wang, Wei Zou, "Demystifying Hidden Privacy Settings in Mobile Apps", IEEE S&Pโ19, 2019. [PDF] [Page]
[9] Mingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou and Kai Chen. "RoLMA: A Practical Adversarial Attack against Deep Learning-based LPR Systems", Inscryptโ19, 2019. [PDF][Page]
[10] Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, XiaoFeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han, "Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews", ACM CCSโ17, 2017. [PDF] [Demo]
[11] Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiaoyong Zhou, Xinhui Han and Michael Grace, "Ghost Installer in the Shadow: Security Analysis of App Installation on Android", DSNโ17, 2017. [PDF]