1. Kumar, D., Ma, Z., Durumeric, Z., Mirian, A., Mason, J., Halderman, J.A., Bailey, M.: Security challenges in an increasingly tangled web. Proceedings of the 26th International Conference on World Wide Web (2017)
2. Ramasubramanian, V., Sirer, E.G.: Perils of transitive trust in the domain name system. In: ACM/SIGCOMM Internet Measurement Conference (2005)
3. Houser, R., Hao, S., Li, Z., Liu, D., Cotton, C., Wang, H.: A comprehensive measurement-based investigation of dns hijacking. 2021 40th International Symposium on Reliable Distributed Systems (SRDS), 210–221 (2021)
4. Houser, R., Hao, S., Cotton, C., Wang, H.: A comprehensive, longitudinal study of government dns deployment at global scale. 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 193–204(2022)
5. Guo, R., Chen, J., Liu, B., Zhang, J., Zhang, C., Duan, H., Wan, T., Jiang, J., Hao, S., Jia, Y.: Abusing cdns for fun and profit: Security issues in cdns’ origin validation. 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1–10 (2018)