User profiles for Julien Lancia

Julien Lancia

ST Microelectronics
Verified email at st.com
Cited by 117

Topology of megagauss magnetic fields and of heat-carrying electrons produced in a high-power laser-solid interaction

L Lancia, B Albertazzi, C Boniface, A Grisollet… - Physical review …, 2014 - APS
The intricate spatial and energy distribution of magnetic fields, self-generated during high
power laser irradiation (at I λ 2 ∼ 1 0 13 - 1 0 14 W . cm − 2 . μ m 2 ) of a solid target, and of the …

Detecting fault injection vulnerabilities in binaries with symbolic execution

J Lancia - 2022 14th International Conference on Electronics …, 2022 - ieeexplore.ieee.org
We propose a framework based on symbolic execution to identify automatically and consistently
the effects of fault injection on embedded software at assembly level, for C (compiled to …

Java card combined attacks with localization-agnostic fault injection

J Lancia - International Conference on Smart Card Research and …, 2012 - Springer
In this paper, we present a paradigm for combined attacks on Java Cards that lowers the
requirements on the localization precision of the fault injection. The attack relies on educated …

Java card virtual machine compromising from a bytecode verified applet

J Lancia, G Bouffard - Smart Card Research and Advanced Applications …, 2016 - Springer
The Byte Code Verifier (BCV) is one of the most important security element in the Java Card
environment. Indeed, embedded applets must be verified prior installation to prevent ill-…

High-level programming support for robust pervasive computing applications

W Jouve, J Lancia, N Palix, C Consel… - 2008 Sixth Annual …, 2008 - ieeexplore.ieee.org
In this paper, we present a domain-specific interface definition language (IDL) and its
compiler, dedicated to the development of pervasive computing applications. Our IDL provides …

Fuzzing and overflows in Java Card smart cards

J Lancia, G Bouffard - SSTIC, 2016 - hal.science
The Byte Code Verifier (BCV) is one of the most important security element in the Java Card
environment. Indeed, embedded applets must be verified prior installation to prevent ill-…

Ontology-directed generation of frameworks for pervasive service development

C Consel, W Jouve, J Lancia… - Fifth Annual IEEE …, 2007 - ieeexplore.ieee.org
Pervasive computing applications are tedious to develop because they combine a number
of problems ranging from device heterogeneity, to middleware constraints, to lack of …

Anomalous self-generated electrostatic fields in nanosecond laser-plasma interaction

L Lancia, M Grech, S Weber, JR Marquès… - Physics of …, 2011 - pubs.aip.org
Electrostatic (E) fields associated with the interaction of a well-controlled, high-power,
nanosecond laser pulse with an underdense plasma are diagnosed by proton radiography. Using …

Experimental evidence of short light pulse amplification using strong-coupling stimulated Brillouin scattering in the pump depletion regime

L Lancia, JR Marques, M Nakatsutsumi, C Riconda… - Physical review …, 2010 - APS
The energy transfer from a long ( 3.5 ps ) pump pulse to a short ( 400 fs ) seed pulse due to
stimulated Brillouin backscattering in the strong-coupling regime is investigated. The two …

A multimedia-specific approach to WS-Agreement

W Jouve, J Lancia, C Consel… - … European Conference on …, 2006 - ieeexplore.ieee.org
WS-agreement offers a general language and protocol to establish agreements between
two parties. In principle, this generality enables a wide variety of domains to be covered. Yet, …