This paper introduces the reader to techniques that can be used to analyze ROP payloads that are used in exploits in the wild.
You can download it from the following link: https://packetstormsecurity.com/files/download/129241/rop-deepdive.pdf
Source: https://packetstormsecurity.com/files/129241/Deep-Dive-Into-ROP-Payload-Analysis.html

