Robert Kemp

Document Type

Honors Thesis


Security auditing of software applications is becoming a necessity with a growth in the complexity of attacks and number of attackers. There are many ways to conduct a security audit and many things that may be looked for. In general, a software security auditing process follows three main phases: analysis of the code base for vulnerabilities, categorizing/ranking these vulnerabilities based on the threat they pose, and fixing the vulnerabilities through alterations to the application’s code or design. The purpose of this work was to perform a security audit of the Whatchamabudget budgeting application being designed for the CSE capstone class, Computer System Design Project II. After performing an audit as detailed previously, a number of low-to-high severity vulnerabilities were discovered and subsequently patched, improving the security of the application, thus adding value to the project as a whole.

Publication Date






To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.