A paper that details the manipulation of the destructor when utilizing a buffer overflow, a format string attack, or corrupting a malloc chunk.
You can download it from the following link: https://packetstormsecurity.com/files/download/29662/manipulating.dtors.txt
Source: https://packetstormsecurity.com/files/29662/manipulating.dtors.txt.html

