Chief Scientist • Oct, 2024 — Present
- Lead cybersecurity consulting across the total product lifecycle for more than 100 medical devices and health data systems, supporting IDE, De Novo, Traditional, Special, and Abbreviated 510(k) submissions, PMAs, and postmarket activities.
- Design and develop a company-wide cybersecurity risk management (CRM) framework aligned with AAMI TIR57, AAMI/ISO 14971, ISO/IEC 27001, NIST SP 800-30, FDA premarket and postmarket cybersecurity guidance, and EU MDR.
- Perform comprehensive CRM activities, including threat modeling, risk assessment, SBOM development and management, cybersecurity requirements definition, architecture views, and evaluation of unresolved anomalies with security impact.
- Conduct architecture and design-input cybersecurity gap assessments to evaluate system architecture, cybersecurity exposure, and regulatory alignment.
- Design and develop standardized cybersecurity testing methodologies that incorporate vulnerability analysis, penetration testing, and verification of cybersecurity requirements.
- Prepare premarket cybersecurity documentation, including architecture views, threat models, cybersecurity risk assessments, SBOMs, cybersecurity labeling, and other submission-ready deliverables.
- Develop postmarket cybersecurity management processes, including vulnerability monitoring, coordinated vulnerability disclosure, software update and patching strategies, and periodic cybersecurity testing.
- Support regulatory interactions by preparing AINN deficiency responses, pre-submission materials, and other communications with the FDA and regulatory bodies.
- Direct secure product development lifecycle (SDLC) implementation for regulated medical devices, improving security controls across firmware, software, mobile, desktop, and cloud systems.
- Design and deploy PKI and cryptographic services for embedded systems, mobile and desktop applications, and cloud-based services.
- Lead technical project management for all medical device engagements, including scoping, planning, schedules, and multi-team coordination.
- Support business operations, including prospecting calls, technical scoping, SoWs, MSAs, NDAs, and engagement planning.
- Mentor and lead teams of PhD researchers, graduate engineers, and cybersecurity practitioners; supervise interns and work-study personnel.
- Provide technical support for litigation matters, including patent infringement and validity analysis, trade secret and IP cases, contract disputes, antitrust matters, regulatory compliance, and class actions.
Vice President of Medical Security • Oct, 2023 — Oct, 2024
Director of Medical Security • Dec, 2018 — Dec, 2023
Research Scientist • May, 2016 — Dec, 2018
Consultant • Jun, 2015 — May, 2016
Fellow • Aug, 2025 — Present
- Provide expert witness testimony at trial for cases involving medical device cybersecurity, health IT systems, and networking.
- Serve as lead investigator on HHS and DOJ contracts related to healthcare IT, medical systems cybersecurity, and HIPAA compliance.
Software Engineer • Jul, 2015 — May, 2016
- Ported attribute-based encryption software to target architectures.
- Updated Zeutro library build systems and open-source dependencies.
- Ran and tested software on ARM, macOS, Windows, and Android platforms.
Systems Engineer • Nov, 2003 — Nov, 2010
- Provided support for business administration, finance, and technical services.
- Implemented proprietary software in Visual Basic, PHP, Perl, and IBM SPSS.
- Mentored three high school work-study temporary hires.
- Managed servers and services on the intranet.
- Implemented web services using HTML, CSS, and JavaScript.
- Managed secure network infrastructure for staging and managing COTS software.
- Extended third-party services using undocumented API requests.
- Provided web-based technical support to external groups and agencies.
- Enabled and co-authored workforce surveys.
- Mentored one college intern.
Adjunct Associate Research Scientist, Dept. of Computer Science • Feb, 2026 — Present
- Principal investigator for Health and Medical Security (HMS) Lab.
- Teaching Security and Privacy in Computing (SPC) 601.643/443.
- Created and teaching Medical Device Cybersecurity (MDC) 601.644/444.
- Awarded the 2026 Joel Dean Excellence in Teaching Award (Computer Science).
- Doctoral thesis co-advisor for:
- Logan Kostick, Expected Summer 2026
- Dissertation committee member for:
- Graduate MSSI Capstone Project mentor for:
- Kaixin Du, Zhicheng Sun, Medical Device Universal Security Alignment (Cloud and App Security), Fall 2025
- Dibyajyoti Nath, Ramit Saraswat, Medical Device Universal Security Alignment (Embedded Systems and Machine Learning), Fall 2025
- Jiarou Deng, Yang Yang, A Zero-Knowledge Proof Framework for Secure and Verifiable Software Bill of Materials Validation, Fall 2025
- Pu Ji, Sikai Teng, Ahmad Faridi, A Framework for Automating Integrated Static Application Security Testing (SAST) Vulnerability Detection in C and C++ Programs, Spring 2025
- Shun Yang, Tianze Ran, Ziang Liang, Postmarket Vulnerability Surveillance for Medical Devices, Spring 2022
Lecturer, Dept. of Computer Science • Jul, 2023 — Present
Lecturer, Engineering for Professionals • Jul, 2025 — Present
Research Assistant, Dept. of Computer Science • Aug, 2011 — May, 2016
- Conducted and published peer-reviewed research on security and privacy in health and medical systems, including implantable and wearable medical devices, health IT infrastructure, and clinical data systems.
- Focused research areas included applied cryptography, trusted computing, low-level systems security, embedded and cyber-physical systems, and adversarial analysis of real-world deployed platforms.
- Designed, executed, and evaluated experimental systems and empirical security studies, with results published in top-tier security and privacy venues.
- Collaborated with faculty and interdisciplinary research teams on systems, cryptography, and healthcare-focused security research.
- Contributed to and extended open-source cryptographic research frameworks, including Charm, libfenc, and Pairing-Based Cryptography (PBC), to support experimental cryptographic research.
- Served as Lecturer for Hardware Hacking (600.243.13) during Winter 2015, creating and delivering lectures and hands-on demonstrations on low-level systems security.
- Supported undergraduate and graduate instruction as a Teaching Assistant for courses including Database Systems, Modern Cryptography, and UI and Mobile Application Development.
- Served as Course Assistant for Security and Privacy in Computing and Network Security, grading assignments and holding office hours.
- Served as a research program analyst developing cryptographic software to secure electronic medical records using attribute-based encryption, including cross-platform implementation and validation across ARM, x86, and AMD64 architectures on Windows, macOS, and Linux, and integration into a mobile electronic health record system.
- Research supported by the U.S. Department of Health and Human Services through the Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) program (Award No. 90TR0003-0).
- Research supported by the National Science Foundation through the Trustworthy Health and Wellness (THaW) Frontier (CNS-1329737).
Ph.D. Candidate, Dept. of Computer Science • Nov, 2015 — May, 2016
Ph.D. Student, Dept. of Computer Science • Aug, 2011 — Nov, 2015
Teaching Assistant, Dept. of Computer Science • January, 2012 — May, 2013
Course Assistant, Dept. of Computer Science • August, 2010 — May, 2011
Research Program Analyst, Dept. of Computer Science • Nov, 2010 — Aug, 2011
Advisory Board Member, Professional Engineering Program • Oct, 2025 — Present
- Provide strategic guidance to align Systems Engineering, Engineering Management, and Technical Management programs with evolving industry and government needs.
- Contribute professional insights to strengthen curriculum relevance and integrate modern systems engineering and management tools.
- Support student success through mentoring, career readiness initiatives, and employer-engaged projects.
- Collaborate with university leadership to expand partnerships across academia, industry, and government.
- Advise on emerging trends in medical device cybersecurity, systems risk management, and regulatory science to inform curriculum and applied research.
- Participate in working groups focused on curriculum innovation, student pathways, and program growth.
- Champion UMBC's mission of inclusive excellence and innovation in engineering education.
Visiting Scholar, Dept. of Computer Science • January, 2014 — August, 2014
- Joined the Archimedes Lab led by Professor Kevin Fu.
- Studied medical infusion systems and patient monitors.
- Disassembled and recycled pacemakers.
- Submitted for IRB review to collect ECG data for empirical analysis.
- Automated ECG device button presses using an Arduino and the HID protocol.
- Implemented web-based resource depletion attacks using Web Workers.
- Collaborated with interuniversity students and faculty.
- Researched embedded and passively powered RFID tags.
- Implemented additively homomorphic encryption on RFID tags.
- Installed RFID tags in a concrete foundation to measure exothermic processes of concrete cement.
- Analyzed and classified NetFlow for a local medical campus.
Visiting Scholar, Dept. of Computer Science • May, 2013 — August, 2013
Refereed Conference Proceedings
-
Kostick, Logan, Michael Rushanan†, and Tushar M. Jois. "Compliance v. Completeness: A Case Study on SBOMs in Consideration of FDA Premarket Cybersecurity Guidance." Proceedings of the Healthcare Security Workshop (HealthSec), 2025.
-
Jiarou Deng, Yang Yang, and Michael Rushanan†. "The SBOM Transparency v. Exposure Dilemma: A Case Study on Adversarial Access to Public SBOMs in Healthcare." Proceedings of the Healthcare Security Workshop (HealthSec), 2025.
-
Joseph Carrigan, Paul Martin, and Michael Rushanan. "KBID: Kerberos Bracelet Identification." Proceedings of Financial Cryptography and Data Security (FC), 2016.
-
Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan. "Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage." Proceedings of USENIX Security Symposium (USENIX Security), 2016.
-
Michael Rushanan, David Russell, and Aviel D. Rubin. "MalloryWorker: Stealthy Computation and Covert Channels using Web Workers." Proceedings of International Workshop on Security and Trust Management (STM), 2016.
-
Paul Martin, Michael Rushanan, Thomas Tantillo, Christoph Lehmann, and Aviel D. Rubin. "Applications of Secure Location Sensing in Healthcare." Proceedings of ACM Conference of Bioinformatics, Computational Biology, and Health Informatics (BCB), 2016.
-
Michael Rushanan and Stephen Checkoway. "Run-DMA." Proceedings of USENIX Security Workshop on Offensive Technology (WOOT), 2015.
-
Michael Rushanan, Denis Foo Kune, Colleen Swanson, and Aviel D. Rubin. "SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks." Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2014.
22+ publications and 1 patents available via CV mode.
22+ publications and 1 patents available at michaelrushanan.org.
Refereed Journal Articles
Posters and Abstracts
-
Kaixin Du, Dibyajyoti Nath, Ramit Saraswat, Zhicheng Sun, Michael Rushanan†, and Tushar M. Jois. "A Hands-On Platform for Medical Device Security Education." ACM SIGCSE Technical Symposium, 2026.
-
Jiarou Deng, Yang Yang, and Michael Rushanan†. "A Zero-Knowledge Framework for Confidential and Verifiable SBOM Validation." Annual Computer Security Applications Conference (ACSAC), 2025.
-
Jessica Ladd, Jenny McManus, Stephan Adelson, Charlotte Gaydos, and Michael Rushanan. "Initial Uptake of STI Partner Notification Website So They Can Know." International Society for Sexually Transmitted Diseases Research (ISSTDR), 2013.
-
Michael Rushanan, Denis Foo Kune, Daniel E. Holcomb, and Colleen Swanson. "An Evaluation of ECG use in Cryptography for Implantable Medical Devices and Body Area Networks." USENIX Security Workshop on Health Information Technologies (HealthTech), 2014.
-
Miran Alhaideri, Michael Rushanan, Denis Foo Kune, and Kevin Fu. "The Moo and Cement Shoes: Future Directions of A Practical Sense-Control-Actuate Application." International Workshop on the Swarm at the Edge of the Cloud (SEC), 2013.
-
Michael Rushanan, Denis Foo Kune, and Kevin Fu. "aheM: Additively Homomorphic Encryption for the Moo." Cryptographic Hardware and Embedded Systems (CHES), 2013.
-
Michael Rushanan, Miran Alhaideri, Denis Foo Kune, and Kevin Fu. "Towards a Threat Model for Actors in the Swarm." International Workshop on the Swarm at the Edge of the Cloud (SEC), 2013.
-
James F. Philbin, Matthew Green, Yu Ning, Mohmoud Ismail, and Michael Rushanan. "An Efficient Encryption Framework for Medical Images." Society for Imaging Informatics in Medicine (SIIM), 2013.
Technical Reports
-
Paul D. Martin, Michael Rushanan, Stephen Checkoway, Matthew Green, and Aviel D. Rubin. "Classifying Network Protocol Implementation Versions: An OpenSSL Case Study." Technical Report 13-01, Johns Hopkins University, 2013.
-
Jason Gionta and Michael Rushanan. "CSET ’14: 7th Workshop on Cyber Security Experimentation and Test — Conference Reports." ;login: The USENIX Magazine, Vol. 39, No. 6 (Electronic Supplement), 2014.
-
Michael Rushanan. "HotSec ’13: Workshop on Hot Topics in Security — Conference Reports." ;login: The USENIX Magazine (Electronic Supplement), 2013.
-
Michael Rushanan. "HealthTech ’13: Workshop on Health Information Technologies — Conference Reports." ;login: The USENIX Magazine (Electronic Supplement), 2013.
† Principal investigator