SARI – Security & ARtificial Intelligence Lab
Welcome to SARI: Security and ARtificial Intelligence Lab at University of New Haven.
SARI is the ultimate space for students and professors to work on research projects together! The lab aims at fostering students’ interest and participation in research projects. Our research objectives are centered around the following thrusts:
- Modeling more resilient IoT systems, cloud and wireless sensor technology toward cyber-attacks using cryptography, Artificial Intelligence (AI), and data analytics.
- Reverse engineering, malware analysis, and cyber forensics.
- AI security and trustworthiness, and AI applications in cybersecurity.
We believe in actively engaging students and pursuing research that encourage diversity and inclusion. “We lead the lab and we set the lab culture”.
Team Members
![]() |
![]() |
Mohamed Nassar is assistant professor at the University of New Haven. His research interests are cybersecurity and machine learning. | Modhuparna Manna is assistant professor at the University of New Haven. Her research interests are application security, memory forensics, digital forensics, malware analysis, and reverse engineering. |
![]() |
![]() |
Shivanjali Khare is assistant professor at the University of New Haven. Her research interests are modeling more resilient IoT and sensors technology toward cyber-attacks using Cryptography and Artificial Intelligence. | Acil Farhat is graduate research assistant pursuing a master degree in cybersecurity at the University of New Haven. She is interested in homomorphic cryptography and Microsoft SEAL. |
![]() |
![]() |
Rajdeep Bhattacharya is a graduate student pursuing a computer science degree at the University of New Haven. He is interested in integrating AI in the domain of cybersecurity. |
Collaborations
Yehya NASSER, Associate Professor, IMT Atlantique, France. Hardware Security & Embedded AI.
Teaching
Current Research Projects
- Explainable Malware Classification
- AI Fairness for Network Flow Monitoring
- Deep Learning Reverse Engineering
Recent Program Committee
Team members serve as program committee members at renown international conferences and workshops.
- IOTSEQ Co-hosted with SITIS 2022.
- BCCA
- IEEE BC4TAI 2022
Recent Publications
- M. Manna, A. Case, A. Ali-Gombe, G. G. Richard III, “ Memory Analysis of .NET and .Net Core Applications,” Proceedings of the 2022 Digital Forensics Research Conference (DFRWS), July 2022.
- M. Manna, A. Case, A. Ali-Gombe, G. G. Richard III,” Modern macOS Userland Runtime Analysis”, Forensic Science International: Digital Investigation (38)C, 301221
- M. Manna, A. Case, G. G. Richard III, “Performing Mac Memory Analysis Using Objective-C and Swift Data Structures,” Proceedings of the 73rd Annual Meeting of the American Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.
- A. Case, R. Maggio, M. Manna, G. G. Richard III, “Memory Analysis of macOS Page Queues,” Proceedings of the 2020 Digital Forensics Research Conference (DFRWS), July 2020, Memphis, TN.
- G. G. Richard III, A. Case, M. Manna, E. Hahne, A. Ali-Gombe, Digital Investigation and the Trojan Defense, Revisited. In: Ijeh AC, Curran K, editors. Crime Science and Digital Forensics: A Holistic View, Science Publishers, an imprint of CRC press (Taylor and Francis Group), Boca Raton, FL, USA. 2021.
- Carlson, A., Khare, S., Dutta, I.K., Ghosh, B. and Totaro, M., 2022, January. Space Selection and Abstraction in Set Theoretic Estimation. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0012-0020). IEEE.
- Ghosh, Bhaskar, Indira Kalyan Dutta, Shivanjali Khare, Albert Carlson, and Michael Totaro. “Isomorphic cipher reduction.” In 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 0947-0953. IEEE, 2021.
- D. A. Bared and M. Nassar, Segmentation Fault: A Cheap Defense Against Adversarial Machine Learning, 2021 3rd IEEE Middle East and North Africa COMMunications Conference (MENACOMM), 2021, pp. 37-42, doi: 10.1109/MENACOMM50742.2021.9678308.
- Sara Hajj Ibrahim and M. Nassar, Hack The Box: Fooling Deep Learning Abstraction-Based Monitors.
LeetCode
Team members enjoy solving leetcode puzzles.
Check our custom solutions to leet code puzzles Daily LeetCode
Hack The Box
Team members enjoy pwning Hack The Box machines. Take a look at our mini-walkthroughs. The idea is to represent each box as a tree of hints in a very compact manner. No need to go through lengthy tutorials.
TryHackMe
Some team members enjoy hacking THM Rooms.
CTF
Some team members enjoy participating at Catch-The-Flag events. We compete under UNHFlagPhishers. We plan to have a flag gallery to display some flag pics.
![]() |
![]() |
Sibling Labs
Join or Contact
If you are interested in joining our group or just have a chat, you are invited to fill the following form.
Feel free to add us on Linkedin Modhu, Nassar, Shivi or send an email Contact Us.