Our concepts were mainly tested on a simple insecure program we generated specifically for this purpose.  The program contains a straightforward buffer overflow vulnerability we exploit to complete our proof-of-concept attacks.  The source code is given in the listing.  The function \texttt{nothing()} indeed performs no useful task, and is only a vehicle for introducing useful code chunks into the \texttt{.text} section.
\begin{figure}[h!]
\lstinputlisting[language=C]{test_file.c}
\label{listing:contrivedbinary}
\end{figure}
