Michael Rushanan

Ph.D. Candidate, Computer ScienceMichael Rushanan's Picture
Department of Computer Science, Johns Hopkins University (JHU)
Johns Hopkins University Information Security Institute (JHUISI)


CONTACT
Johns Hopkins University Information Security Institute - Health and Medical Security Lab (JHUISI HMS)
Maryland Hall, Room 316
3400 North Charles Street
Baltimore, MD 21218

micharu1 [AT] cs.jhu.edu


EDUCATION
Ph.D. Candidate, Computer Science
Advisor(s): Dr. Aviel D. Rubin
Johns Hopkins University Information Security Institute, Baltimore Maryland
August 2011 - Present

Master of Science in Engineering, Computer Science [In Progress]
Master of Science in Engineering, Security Informatics [In Progress]
Johns Hopkins University Information Security Institute, Baltimore Maryland
August 2009 - Present

Bachelor of Science, Computer Science and Engineering
Minor, Psychology
University of Maryland, Baltimore County
Completed May 2009

[cv] http://michaelrushanan.org/pdf/michael_rushanan_cv.pdf
[blog] http://michael-rushanan.blogspot.com/
[webpage] http://michaelrushanan.org/
[linkedin] http://www.linkedin.com/profile/view?id=92236729&trk=tab_pro


PUBLICATIONS
Charm: A Framework for Rapidly Prototyping Cryptosystems. Joseph  Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, Aviel D. Rubin. In submission Journal of Cryptographic Engineering.

The Moo and Cement Shoes: Future Directions of A Practical Sense-Control-Actuate Application. Miran Alhaideri, Michael Rushanan, Denis Foo Kune, Kevin Fu. In the proceedings of the First International Workshop on the Swarm at the Edge of the Cloud (SEC) 2013.

An Attacker-Centric Threat Model for Actors in the Swarm. Michael Rushanan, Miran Alhaideri, Denis Foo Kune, Kevin Fu. Poster session presented at: First International Workshop on the Swarm at the Edge of the Cloud (SEC) 2013.

aheM: Additively Homomorphic Encryption for the Moo. Michael Rushanan, Denis Foo Kune, Kevin Fu. Poster session presented at: Cryptographic Hardware and Embedded Systems (CHES) 2013.

An Efficient Encryption Framework for Medical Images. James F. Philbin, PhD, Johns Hopkins Medical Institutions; Matthew Green, PhD; Yu Ning, MS; Mohmoud Ismail, MS; Michael Rushanan, MS. Poster session presented at: Society for Imaging Informatics in Medicine (SIIM) 2013.

Initial Uptake of STI Partner Notification Website So They Can Know. Jessica Ladd, Jenny McManus, Stephan Adelson, Charlotte Gaydos, and Michael Rushanan. Poster presented at: International Society for Sexually Transmitted Diseases Research (ISSTDR).


SOFTWARE PROJECTS
Libfenc library : A C-based attribute-based encryption library. [code]
Charm : An advanced cryptographic library for developing a variety of cryptographic schemes and protocols. [code]

ACADEMIC INSTRUCTION
Teaching Assistant, EN.600.442 "Mobile Application Development," Dr. Froehlich, Johns Hopkins University. Spring 2013.

This course will provide students with a rich development experience, focussed on the design and implementation of user interfaces and mobile applications. A brief overview of human computer interaction will provide context for designing, prototyping and evaluating user interfaces. Students will invent their own mobile applications and implement them using the Android SDK, which is JAVA based. An overview of the Android platform and available technologies will be provided, as well as XML for layouts, and general concepts for effective mobile development. Students will be expected to explore and experiment with outside resources in order to learn technical details independently. There will also be an emphasis on building teamwork skills, and on using modern development techniques and tools.

Teaching Assistant, EN.600.316/416 "Database Systems," Dr. Ahmad, Johns Hopkins University. Spring 2012.

This course serves as an introduction to the architecture and design of modern database management systems. Database management systems (DBMS) are widely used to manage, store and query diverse datasets and have become an invaluable tool in today's enterprises and large web companies with applications in transaction processing, business intelligence and analytics. Topics include query processing algorithms and data structures, data organization and storage, query optimization and cost modeling, transaction management and concurrency control, high-availability mechanisms, parallel and distributed databases, and a survey of modern architectures including NoSQL, column-oriented and streaming databases. In addition to technical material, we will devote a portion of weekly lectures to looking at the use of database technology in today's enterprises, including document indexing at Google, parallel data warehousing with systems such as Hadoop and HIVE, and transactional web applications. Coursework includes programming assignments and experimentation in a simple database framework written in Java.

Teaching Assistant, EN.600.442 "Modern Cryptography," Dr. Pappacena, Johns Hopkins University. Fall 2012.

This course focuses on cryptographic algorithms, formal definitions, hardness assumptions, and proofs of security. Topics include number-theoretic problems, pseudo-randomness, block and stream ciphers, public-key cryptography, message authentication codes, and digital signatures.

Course Assistant, EN.600.424 "Network Security," Dr. Mishra, Johns Hopkins University, Spring 2011.

This course focuses on communication security in computer systems and networks. The course is intended to provide students with an introduction to the field of network security. The course covers network security services such as authentication and access control, integrity and confidentiality of data, firewalls and related technologies, Web security and privacy. Course work involves implementing various security techniques. A course project is required.

Course Assistant, EN.600.443 "Security and Privacy," Dr. Small, Johns Hopkins University, Fall 2010.

Lecture topics will include computer security, network security, basic cryptography, system design methodology, and privacy. There will be a heavy work load, including written homework, programming assignments, exams and a comprehensive final. The class will also include a semester-long project that will be done in teams and will include a presentation by each group to the class.


HONOR SOCIETIES
Upsilon Pi Epsilon (UPE). International Honor Society for the Computing and Information Disciplines, JHU Chapter

2011-2013 Chapter President

JHU chapter of the Association for Computing Machinery

2013-Present Member

 

ABOUT ME
I am currently a third year Ph.D. student at the Johns Hopkins University (JHU) in the Health and Medical Security Lab (HMS). My varying interests, cohesively captured under the umbrella of computer security, span the domains of embedded systems and applications of cryptography. In my spare time, I enjoy the exploration of: raspberry pi and similar platforms, RFID and mobile application development, and what I consider to be commodity hacking (e.g, jailbreaking, rooting, and firmware flashing). Additionally, I have experience with network simulators (e.g., DeterLab), hobbyist-level electronics tinkering, and I follow the open source disposition that if I can share my code and experience - I will not hesitate to do so.