TRUSTup is a software solution aimed at increasing cyber-trust between the people, connected objects, and the companies that make them.
The TRUSTup is a software solution for creating cyber-trust in connected homes by implementing a cyber-trust framework that takes into account the 1) manufacturer, configuration and interoperability of devices in a home, 2) the experience, background and position on individuals occupying the space on a spectrum (hearing, vision, physical/motor, and autism) and 3) the content, type, and amount of data being collected, whether disclosed or undisclosed. TRUSTup comes from the realization modern Western homes are increasingly equipped with smart and connected devices. This multiplication of sensors brings into the home a multitude of multimodal interfaces (voice, web, tactile), hidden tracking, embedded automation, and adaptive learning. As a result, the home of the future is a massive data collection ecosystem that can be misused for economic and financial gain and is vulnerable to cyber-attacks. The homeowner is often unaware of the data being collected or the security risk they face by introducing a new device in their living space. As a result, there is a deficit of trust between smart and connected spaces and the people occupying the space. This deficit of trust has a critical impact. While a smart home's goal is to adapt to and support its occupants, current devices and algorithms are not trusted to adapt to the diversity of experience, background, preferences, and physical ranges routinely encountered in real life. As a result, people's experiences on a spectrum (hearing, vision, physical/motor, autism) are often not effectively accommodated. The solution is to increase trust between the people, connected objects, and the companies that make them. To address these challenges, TRUSTup (1) detects and identifies connected IoT devices in the user's home, (2) retrieves, processes, and analyzes associated Privacy Policies (PPs) and Terms of Service (ToS), (3) identifies security-related software flaws and misconfigurations by leveraging the U.S. government repository and social media, (4) presents cyber-trust-related insights to the user through an accessible and inclusive interface.
- Dr. Krzysztof Rechowicz
- Dr. Stephanie Blackmon
- Dr. Dylan Wittkower
- Dr. Saikou Diallo
- Jessica Cordner
- John Shull
- Alex Nielsen
- Tobin Zheng
- Brandon Feldhaus
- Russell Moore
- We use git Large File Storage: git lfs
- LFS manages complicated large media files better than traditional git at a cost
- This management is done with the .gitattributes file and can be modified to update to match additional file formats.
- See Systems Design Document for more information.
- See Research for misc. research papers and content related to research specific topics.