This database contains reports analyzing software failures from the news. Currently, it contains failures from 2010 to 2022. This database was created through the FAIL (Failure Analysis Investigation with LLM) project. FAIL leverages Large Language Models (LLMs) to collect and analyze software failures reported in the news. Our work has been presented in the paper titled "FAIL: Analyzing Software Failures from the News Using LLMs." Contributing members include Dharun Anandayuvaraj, Matthew Campbell, Tanmay Singla, Parth Patil, Arav Tewari, and James C. Davis from Purdue University.
| Title | Published Date | System | Number of Articles | Actions |
|---|---|---|---|---|
| Man-in-the-Middle Attack Exploiting Microsoft Update Certificate Vulnerability | 2012-06-04 | 1. Microsoft Update system 2. Remote Desktop service cryptography algorithm used by Microsoft for enterprise customers 3. Terminal Server Licensing Service 4. Windows Update service 5. Rogue Microsoft certificate 6. Flame malware component "Gadget" 7. WPAD (Web Proxy Auto-Discovery Protocol) | 1 | View Details |
| Potential Vulnerabilities in Microsoft's Secure Boot Technology. | 2012-06-11 | 1. Secure Boot system [12718] | 1 | View Details |
| Employee Turns ESEA Software into Bitcoin-Mining Trojan, Impacting Users | 2013-07-09 | 1. ESEA gaming network software 2. Counter-Strike anti-cheating modes 3. Bitcoin-mining code added by a rogue employee 4. Graphics processing chips on gaming machines 5. Peer-to-peer Bitcoin network | 1 | View Details |
| NFC Vulnerabilities Exploited in Samsung and Nokia Devices | 2012-07-26 | 1. Android Beam feature on Samsung Galaxy Nexus 2. Content sharing setting on Nokia N9 running MeeGo 3. NFC technology implementation on smartphones 4. Browser bug on the Samsung Galaxy Nexus 5. Operating system on the Nokia N9 running MeeGo 6. NFC chip security vulnerability 7. Google Wallet technology 8. NFC signal range limitations 9. NFC-based attacks prevention measures 10. NFC chip implementation on movie posters 11. Frictionless-sharing approach on devices | 1 | View Details |
| Call of Duty: Black Ops Declassified - Disastrous Software Failure | 2012-11-29 | 1. PS Vita - Call of Duty: Black Ops Declassified game [15840] | 1 | View Details |
| MI5's Anti-Terror Supercomputer Delay Impacts Olympic Security | 2012-07-14 | 1. New 'electronic records management' system designed to help MI5 officers track terror suspects [13114] | 1 | View Details |
| Misguided Response to False Malware Alert Leads to Costly Destruction | 2013-07-10 | 1. Desktop computers 2. Printers 3. TVs 4. Cameras 5. Mice 6. Keyboards 7. EDA's computer system The software failure incident involved the failure of various hardware components and systems within the Economic Development Administration, including desktop computers, printers, TVs, cameras, mice, keyboards, and the agency's computer system [20576]. | 1 | View Details |
| Android Phones Vulnerable to Malicious Code Injection via NFC | 2012-07-26 | 1. Android smartphones [13247] 2. Android feature known as near field communications [13247] 3. Android browser security [13247] 4. Google's "Bouncer" technology for identifying malicious programs in Google Play Store [13247] | 1 | View Details |
| Bike-Share Program Delayed Due to Software Glitches and Dispute | 2012-08-17 | 1. 8D Technologies software supplied for successful programs in Boston and Washington [14043] 2. New operating code for the bike-share program in New York City [14043] | 1 | View Details |
| Facebook Impersonating Users to Promote Content Without Consent | 2013-01-25 | 1. Facebook's Sponsored Stories ad product 2. Facebook's Related Posts feature | 1 | View Details |