
Security‑API Misuse Across Mobile and Web Applications: A Systematic Review
Security application programming interfaces—cryptographic primitives, SSL/TLS configuration, OAuth flows, biometric sensors, and framework‑specific security modules such as Spring Security and Google SafetyNet Attestation—are the building blocks of secure mobile and web software. When developers do not adhere to the precise specifications of these APIs, the resulting code can be vulnerable to man‑in‑the‑middle attacks, data leakage, regulatory non‑compliance, and other serious security problems. This blog presents a systematic review of the literature that surveyed 69 primary studies in mobile and web contexts. The review identifies thirty distinct misuse types, evaluates the detection techniques that have been employed, and examines the current state of public benchmarks. It also draws practical implications for researchers and practitioners.
