R. Beverly and S. Bauer, The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet, USENIX Steps to Reducing Unwanted Traffic on the Internet (SRUTI) Workshop, 2005.

R. Beverly, A. Berger, Y. Hyun, and K. Claffy, Understanding the Efficacy of Deployed Internet Source Address Validation Filtering, Internet Measurement Conference, 2009.

, CAIDA. 2020. The Spoofer Project

D. Kaminsky, It's the End of the Cache as We Know It, 2008.

M. Korczy?ski, M. Król, and M. Van-eeten, Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates, Internet Measurement Conference, 2016.

M. Korczy?ski, Y. Nosyk, Q. Lone, M. Skwarek, B. Jonglez et al., The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic, 2020.

M. Korczy?ski, Y. Nosyk, Q. Lone, M. Skwarek, B. Jonglez et al., Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic, Passive and Active Measurement Conference, pp.107-121, 2020.

M. Kührer, T. Hupperich, C. Rossow, and T. Holz, Exit from Hell? Reducing the Impact of Amplification DDoS Attacks, USENIX Conference on Security Symposium, 2014.

F. Lichtblau, F. Streibelt, T. Krüger, P. Richter, and A. Feldmann, Detection, Classification, and Analysis of Inter-domain Traffic with Spoofed Source IP Addresses, Internet Measurement Conference, 2017.

Q. Lone, M. Korczy?ski, C. Gañán, and M. Van-eeten, SAVing the Internet: Explaining the Adoption of Source Address Validation by Internet Service Providers, Workshop on the Economics of Information Security, 2020.

Q. Lone, M. Luckie, M. Korczy?ski, H. Asghari, M. Javed et al., Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer, Traffic Monitoring and Analysis Conference, 2018.

Q. Lone, M. Luckie, M. Korczy?ski, and M. Van-eeten, Using Loops Observed in Traceroute to Infer the Ability to Spoof, Passive and Active Measurement Conference, 2017.

M. Luckie, R. Beverly, R. Koga, K. Keys, J. Kroll et al., Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet, Computer and Communications Security Conference (CCS), 2019.

J. Mauch, Spoofing ASNs, 2013.

L. F. Müller, M. J. Luckie, B. Huffaker, and M. P. Barcellos, Challenges in Inferring Spoofed Traffic at IXPs. In Conference on Emerging Networking Experiments And Technologies (CoNEXT), pp.96-109, 2019.

D. Senie and P. Ferguson, Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. RFC 2827, 2000.

L. Shafir, Y. Afek, and A. Bremler-barr, NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities, USENIX Security Symposium, 2020.

M. Skwarek, M. Korczy?ski, W. Mazurczyk, and A. Duda, Characterizing Vulnerability of DNS AXFR Transfers with Global-Scale Scanning, 2019 IEEE Security and Privacy Workshops, pp.193-198, 2019.

, The Closed Resolver Project, 2020.