This database contains reports analyzing software failures from the news. Currently, it contains failures from 2010 to 2022. This database was created through the FAIL (Failure Analysis Investigation with LLM) project. FAIL leverages Large Language Models (LLMs) to collect and analyze software failures reported in the news. Our work has been presented in the paper titled "FAIL: Analyzing Software Failures from the News Using LLMs." Contributing members include Dharun Anandayuvaraj, Matthew Campbell, Tanmay Singla, Parth Patil, Arav Tewari, and James C. Davis from Purdue University.
| Title | Published Date | System | Number of Articles | Actions |
|---|---|---|---|---|
| NHS Surrey Data Breach Due to Improper Data Destruction | 2013-08-19 | 1. Data destruction process at NHS Surrey 2. Lack of accredited erasure software or degausser for non-functioning computers at NHS Surrey 3. Failure to securely recycle computers at NHS Surrey 4. Lack of education and awareness about data erasure requirements at NHS Surrey 5. Failure of companies to properly erase data before discarding old computers or hard drives [20726] | 1 | View Details |
| iOS Vulnerability Exploited for Potential iPhone Botnet Creation | 2014-08-01 | 1. iOS operating system 2. Windows PCs 3. Apple's security measures 4. Apple's software restrictions 5. Apple's bug fixes process 6. Apple's response to reported vulnerabilities | 1 | View Details |
| Hackers Exploit RAT to Spy on Women Through Webcams | 2013-03-12 | The software failure incident described in the article involved the failure of various systems and components: 1. Remote administration tool (RAT) system [Article 17450] 2. Anti-virus and anti-malware software [Article 17450] 3. Operating system software (e.g., Windows) [Article 17450] 4. Software plugins used by web browsers (e.g., Flash and Java) [Article 17450] | 1 | View Details |
| FBI Malware Exploits Firefox Vulnerability to Target Tor Users | 2013-08-05 | 1. Firefox 17 ESR 2. Tor Browser Bundle 3. Magneto code 4. CIPAV (Computer and Internet Protocol Address Verifier) by the FBI <Article 20888> | 1 | View Details |
| Lack of Encryption in Yahoo and ICQ Instant Messaging Systems | 2014-02-28 | 1. Yahoo Messenger Protocol 2. ICQ messaging system 3. AOL's AIM desktop app 4. WhatsApp messaging application [24440] | 1 | View Details |
| Smart Light Bulb Vulnerability Allows Hackers to Spread Malicious Code | 2016-11-03 | 1. Philips Hue smart light bulb [49740] | 1 | View Details |
| Pre-installed Chinese Malware on US Government Phones by Assurance Wireless. | 2016-11-15 | 1. UMX U686CL Android-based phone - Chinese malware pre-installed apps [94612] 2. Blu phones - Preinstalled software from Shanghai Adups Technology sending data to Chinese servers [71032, 61882, 49741] | 4 | View Details |
| Cyberattack on South Korean TV and Banks Systems. | 2013-03-20 | 1. Systems of major television operators and banks 2. Computers of YTN, KBS, MBC 3. Shinhan Bank system 4. Nonghyup Bank equipment 5. Jeju Bank computers and ATMs [17652] | 1 | View Details |
| Malware Attack on ATMs in Europe: Touchless Jackpotting Incident | 2016-11-23 | 1. ATM software system 2. Banking information systems 3. Central banking system 4. Malware or malicious software 5. Diebold Nixdorf and NCR Corp. ATM equipment | 1 | View Details |
| Samsung Galaxy S4 Battery Overheating Incident Under Pillow | 2014-07-25 | unknown | 1 | View Details |