Same here. Here's some context I sent him:
<https://www.usenix.org/legacy/events/imc05/tech/full_papers/xia/xia_html/imc05-paper-128-final.html>
<http://nanog.org/meetings/nanog36/presentations/xia.pdf>
<https://youtu.be/cWF4p5EuvQk>
Note related discussion of mitigation tactics here (e.g., TTL-based filtering via tACLs):
<http://www.cisco.com/c/en/us/about/security-center/ttl-expiry-attack.html>