Chapter 11: Bypassing Protections with ROP