It felt too recent to me when I wrote it! I was probably subconsciously hoping for the correction. The technique was certainly circulating many years before any of the papers were released, since all I remember about the papers was people talking about how the technique was finally being written down. :)
But I'd argue that Borrowed Code Chunks exploitation technique paper by stealth from 2005 is the original. But maybe I'm just too old.