I found this paper today,but I could not understand it very much because of my poor exploition knowledge.
I guess spender know it well
Can we beat stackjacking with some grsec config or other way ?
check it out here
http://jon.oberheide.org/files/stackjacking-infiltrate11.pdf