This database contains reports analyzing software failures from the news. Currently, it contains failures from 2010 to 2022. This database was created through the FAIL (Failure Analysis Investigation with LLM) project. FAIL leverages Large Language Models (LLMs) to collect and analyze software failures reported in the news. Our work has been presented in the paper titled "FAIL: Analyzing Software Failures from the News Using LLMs." Contributing members include Dharun Anandayuvaraj, Matthew Campbell, Tanmay Singla, Parth Patil, Arav Tewari, and James C. Davis from Purdue University.
Title | Published Date | System | Number of Articles | Actions |
---|---|---|---|---|
Cyber Attacks Disrupt New Zealand Stock Exchange Operations for Days | 2020-08-26 | 1. Network connectivity system of the NZX exchange [103586, 103567] 2. NZX main board, NZX debt market, and Fonterra shareholders market systems [103586, 103567] | 2 | View Details |
Algorithm Failure in Public Services: Transparency and Bias Concerns | 2020-08-24 | 1. Algorithm used by the exam regulator Ofqual to assess A-level grades [103566] 2. Algorithm used by councils to flag claims as "high risk" for potential welfare fraud [103566] 3. Algorithm used by Sunderland council to make efficiency savings [103566] 4. Data analytics system used by Hackney council to predict children at risk of neglect and abuse [103566] 5. Risk-based verification system used by at least two councils to identify potentially fraudulent benefit claims [103566] 6. Algorithm used by the Home Office to help decide visa applications [103566] 7. Algorithms being experimented with by police forces, including those used by Surrey police, West Yorkshire police, the Met, Hampshire Constabulary, Kent police, South Wales police, and Thames Valley police [103566] | 1 | View Details |
Facial Recognition Algorithms Experience Increased Error Rates with Face Masks | 2020-08-26 | 1. Facial recognition algorithms designed to identify people even when wearing face masks [103647] | 1 | View Details |
Vulnerability in Amazon's Alexa Platform Exposed User Data | 2020-08-13 | 1. Amazon's Alexa platform's web services [103796, 103828] 2. Amazon's subdomains URLs, such as track.amazon.com [103796, 103828] | 2 | View Details |
Cyberattack on Israeli Defense Industry by North Korean Hackers | 2020-08-14 | The software failure incident reported in the article involved a cyberattack on Israel's defense industry by a North Korea-linked hacking group. The systems that failed in this incident were: 1. Israeli defense industry computer systems [103804]: The North Korean hackers were able to penetrate the Israeli defense industry's computer systems, potentially stealing classified data. 2. LinkedIn and WhatsApp communication platforms [103804]: The hackers used these platforms to establish contact with employees of Israeli defense companies, posing as headhunters from prominent defense and aerospace companies. 3. Remote Access Trojan (RAT) tool [103804]: North Korea's hackers installed a remote access trojan on Israeli networks, which is a hacking tool used to gain unauthorized access and steal data. These systems and tools failed as they were compromised by the cyberattack orchestrated by the North Korean hacking group. | 1 | View Details |
August Smart Lock Vulnerability Exposes Wi-Fi Credentials During Setup. | 2020-08-10 | 1. August Smart Lock Pro and Connect module [103826] | 1 | View Details |
Vulnerabilities in Qualcomm's Snapdragon Chip Expose Android Devices to Hacks | 2020-08-10 | 1. Qualcomm's Snapdragon chip 2. Digital signal processing (DSP) component of the Snapdragon chip | 1 | View Details |
Chinese Tecno Phones Sold in Africa Contain Malware Subscription Scam | 2020-08-25 | 1. Tecno W2 smartphones 2. Android operating system 3. Triada malware 4. xHelper malicious code | 1 | View Details |
Data Leak of 50,000 Driving Licences Due to Misconfigured Cloud Storage | 2020-08-31 | 1. Amazon cloud storage service - Misconfigured S3 bucket [104182] 2. Roads and Maritime Services infrastructure - Specifically related to toll notices [104182] | 1 | View Details |
Brain-Computer Interface Vulnerability to Hackers: Implications and Risks | 2020-08-05 | The software failure incident reported in the article [104429] highlights potential vulnerabilities in the brain-computer interfaces (BCIs) being developed by Neuralink. The systems that failed in this incident are: 1. Brain-computer interfaces (BCIs) developed by Neuralink, specifically the technology allowing human brains to interface with computers. 2. Security protocols within the BCIs that were not robust enough to prevent unauthorized access by hackers. 3. Lack of encryption and antivirus software within the BCIs to protect against cyber attacks and data interception. 4. Potential vulnerabilities in the design and implementation of the BCI technology, including the risk of malicious software being transmitted to the devices. These failures indicate a need for stronger security measures and a multi-layered security approach in the design and development of brain-computer interfaces to prevent unauthorized access and protect sensitive data. | 1 | View Details |