Tags: bof pwn exploitation
Rating:
Article goes over a couple of ROP techniques and covers a solution to this problem in SROP (variant 2 (chained)).
I don't remember