I am a fifth year Ph.D. student at the Johns Hopkins University (JHU) in the Health and Medical Security Lab (HMS). My primary research interests are in systems security, health information technology security, privacy, and applied cryptography. My additional interests are in hobbyist-level embedded system design and implementation (e.g., Arduino and Raspberry Pi), mobile application development (i.e., iOS and Android), and programming languages.
I contribute to non-profit development (e.g., So They Can Know) and opensource software development (e.g., GitHub and BitBucket) in my spare time. I also enjoy gaming. If you're interested in a more formal representation of my doings, please see the important links below.
Our favorite electronic devices, such as gaming consoles and smartphones, have a common root --- hardware. These deceptively simple interconnections of electronic components perform arithmetic and logic operations that enable our devices to interact with us and extend current methods for software security, communication, and marketing. In this course, we first survey hacks (e.g., rooting) that furnish a practical understanding of the hardware/software relationship. We continue this relationship by examining the use of hardware emulation and security extensions. Lastly, we explore other niche hardware uses such as asset tracking, advertising, and authentication.
I was a visiting scholar at the University of Michigan, the SPQR Lab specifically, from Winter of 2013 through Summer of 2014, and Summer of 2013. I am back at Hopkins, third floor of Malone Hall! I served as the president of Upsilon Pi Epsilon, the computer science honors soceity, from Spring 2011 to Spring 2013 (i.e, two consecutive terms).
"The computing and information disciplines are relatively young. Yet despite their comparative youth, the computing and information disciplines have had an unparalleled effect on almost every aspect of contemporary life. Indeed it is difficult to predict the ultimate place of the computer in our world. It is the express purpose of Upsilon Pi Epsilon (UPE) to promote the computing and information disciplines and to encourage their contribution to the enhancement of knowledge."
I have been invited to talk at the following events: JHU Information Security Institute Seminar [April 2014], Special Topics Day for Engineering Innovation Lecture on Cybersecurity [Spring 2012], Computer Science Open House [Fall 2012, 2011]. I have facilitated graduate and undergraduate-level courses at Johns Hopkins University through numerous course and teaching assistantships (scores reflect student feedback from course evaluation forms):
"As new generations [of computers] come out, usually there are increased complexity and features, [that lead to] increased security problems. Plus, other industries have shown that every new generation has its own set of security problems."
Peer-Reviewed Conference and Workshop Papers
Charm: A Framework for Rapidly Prototyping Cryptosystems [PDF | BIBTEX]
Joseph Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, Aviel D. Rubin. In the proceedings of the Journal of Cryptographic Engineering (JCEN) 2013.
SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks [PDF | BIBTEX]
Michael Rushanan, Denis Foo Kune, Colleen Swanson, Aviel D. Rubin. In the proceedings of the IEEE Symposium on Security and Privacy (Oakland), 2014.
Classifying Network Protocol Implementation Versions: An OpenSSL Case Study [PDF | BIBTEX]
Paul D. Martin, Michael Rushanan, Stephen Checkoway, Matthew Green, Aviel D. Rubin. Technical Report 13-01, Johns Hopkins University. Dec 2013.
Peer-Reviewed Short Papers and Posters
Initial Uptake of STI Partner Notification Website So They Can Know [PDF | BIBTEX]
Jessica Ladd, Jenny McManus, Stephan Adelson, Charlotte Gaydos, and Michael Rushanan. Poster presented at: International Society for Sexually Transmitted Diseases Research (ISSTDR) 2014.
The Moo and Cement Shoes: Future Directions of A Practical Sense-Control-Actuate Application [PDF | BIBTEX]
Miran Alhaideri, Michael Rushanan, Denis Foo Kune, Kevin Fu. In the proceedings of the First International Workshop on the Swarm at the Edge of the Cloud. Poster session presented at: 2013 TerraSwarm Annual Meeting.
aheM: Additively Homomorphic Encryption for the Moo [PDF | POSTER1 | POSTER2 | BIBTEX]
Michael Rushanan, Denis Foo Kune, Kevin Fu. Poster session presented at: Cryptographic Hardware and Embedded Systems (CHES) 2013. Poster session presented at: 2013 TerraSwarm Annual Meeting.
Towards a Threat Model for Actors in the Swarm [PDF | POSTER | BIBTEX]
Michael Rushanan, Miran Alhaideri, Denis Foo Kune, Kevin Fu. Poster session presented at: First International Workshop on the Swarm at the Edge of the Cloud (SEC) 2013.
An Efficient Encryption Framework for Medical Images [PDF | BIBTEX]
James F. Philbin, PhD, Johns Hopkins Medical Institutions; Matthew Green, PhD; Yu Ning, MS; Mohmoud Ismail, MS; Michael Rushanan, MS. Poster session presented at: Society for Imaging Informatics in Medicine (SIIM) 2013.
HealthTech '13: 2013 USENIX Workshop on Health Information Technologies
Michael Rushanan. Conference Report.
HotSec '13: 2013 USENIX Summit on Hot Topics in Security
Michael Rushanan. Conference Report.
I would love to hear from you! Thanks for visiting. Cheers, Mike.