This is a whitepaper discussing flaws in current stack protection mechanisms and alternate methods of exploiting stack overflows. The paper wastes no time rehashing old methods such as ret2libc or bruteforcing methods against ASLR on forked processes.
4e7ed680646bbcb7250b372e45b6466b0c75f778391612843c163ce4ccd1a39e