2005-10-07 x86-64 buffer overflow exploits and the borrowed code chunks sec exploitation technique http://www.suse.de/~krahmer/no-nx.pdf