{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:28:49Z","timestamp":1755793729198,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/icbc64466.2025.11114684","type":"proceedings-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:34:30Z","timestamp":1755196470000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Bridging Immutability with Flexibility: A Scheme for Secure and Efficient Smart Contract Upgrades"],"prefix":"10.1109","author":[{"given":"Tahrim","family":"Hossain","sequence":"first","affiliation":[{"name":"Syracuse University,USA"}]},{"given":"Sakib","family":"Hassan","sequence":"additional","affiliation":[{"name":"University Of Dhaka,Bangladesh"}]},{"given":"Faisal Haque","family":"Bappy","sequence":"additional","affiliation":[{"name":"Syracuse University,USA"}]},{"given":"Muhammad Nur","family":"Yanhaona","sequence":"additional","affiliation":[{"name":"BRAC University,Bangladesh"}]},{"given":"Tarannum Shaila","family":"Zaman","sequence":"additional","affiliation":[{"name":"University of Maryland"}]},{"given":"Tariqul","family":"Islam","sequence":"additional","affiliation":[{"name":"Syracuse University,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ethereum whitepaper","year":"2014"},{"issue":"2","key":"ref2","first-page":"28","article-title":"Smart contracts: building blocks for digital markets","volume":"18","author":"Szabo","year":"1996","journal-title":"EX-TROPY: The Journal of Transhumanist Thought,(16)"},{"key":"ref3","article-title":"Immutable in principle, upgradeable by design: Exploratory study of smart contract upgradeability","author":"Qasse","year":"2024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/ITU-WT.2017.8247004"},{"key":"ref6","article-title":"Analysis of the dao exploit","author":"Daian","year":"2016"},{"key":"ref7","article-title":"The parity wallet hack explained","author":"Palladino","year":"2024"},{"key":"ref8","volume-title":"Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World","author":"Tapscott","year":"2016"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2021.107133"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx068"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3548683"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00422-3"},{"key":"ref13","article-title":"What is a smart contract proxy pattern?","year":"2024"},{"key":"ref14","volume-title":"Erc-2535: Diamonds, multi-facet proxy","author":"Mudge","year":"2022"},{"key":"ref15","article-title":"Smart contract upgradeability using eternal storage","author":"Spagnuolo","year":"2023"},{"key":"ref16","article-title":"Metamorphic smart contracts: Is evm code truly immutable?","author":"Boogerwooger","year":"2022"},{"key":"ref17","first-page":"1829","article-title":"Proxy hunting: understanding and characterizing proxy-based upgradeable smart contracts in blockchains","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Bodell"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645640"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24713"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/8455894"},{"key":"ref21","first-page":"1289","article-title":"{EVMPatch}: Timely and automated patching of ethereum smart contracts","volume-title":"30th usenix security symposium (USENIX Security 21)","author":"Rodler"},{"key":"ref22","article-title":"Ethereum data structures","author":"Jezek","year":"2021"},{"key":"ref23","article-title":"Go-ethereum"},{"key":"ref24","article-title":"Solidity metrics"}],"event":{"name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Pisa, Italy","start":{"date-parts":[[2025,6,2]]},"end":{"date-parts":[[2025,6,6]]}},"container-title":["2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11114381\/11114414\/11114684.pdf?arnumber=11114684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T05:19:05Z","timestamp":1755235145000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11114684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icbc64466.2025.11114684","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}