{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T19:07:52Z","timestamp":1763579272992,"version":"3.45.0"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB2703600"],"award-info":[{"award-number":["2023YFB2703600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032025"],"award-info":[{"award-number":["62032025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2025A1515011632"],"award-info":[{"award-number":["2025A1515011632"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tse.2025.3609077","type":"journal-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:46:01Z","timestamp":1758217561000},"page":"3072-3087","source":"Crossref","is-referenced-by-count":0,"title":["Towards Exploring Developers\u2019 Struggles in Developing Upgradeable Smart Contracts"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2427-0641","authenticated-orcid":false,"given":"Zhijie","family":"Zhong","sequence":"first","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0192-9992","authenticated-orcid":false,"given":"Jiachi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3100-0534","authenticated-orcid":false,"given":"Jiashui","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5625-0036","authenticated-orcid":false,"given":"Qing","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-8547","authenticated-orcid":false,"given":"Jiajing","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5032-8475","authenticated-orcid":false,"given":"Long","family":"Liu","sequence":"additional","affiliation":[{"name":"Individual Researchers, residing in, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2082-863X","authenticated-orcid":false,"given":"Xinlei","family":"Ying","sequence":"additional","affiliation":[{"name":"Individual Researchers, residing in, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-7718","authenticated-orcid":false,"given":"Zibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Sun Yat-sen University, Zhuhai, China"}]}],"member":"263","reference":[{"year":"2024","key":"ref1","article-title":"Top blockchain DApps"},{"key":"ref2","first-page":"1829","article-title":"Proxy hunting: Understanding and characterizing proxy-based upgradeable smart contracts in blockchains","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Bodell","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645640"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-024-10485-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639153"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833721"},{"article-title":"SmartReco: Detecting read-only reentrancy via fine-grained cross-DApp analysis","year":"2024","author":"Zhang","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639225"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24713"},{"year":"2024","key":"ref11","article-title":"Audius governance takeover post"},{"article-title":"Smart contract upgradeability on the Ethereum blockchain platform: An exploratory study","year":"2023","author":"Qasse","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32415-4_33"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.25"},{"volume-title":"Card Sorting: Designing Usable Categories","year":"2009","author":"Spencer","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2989002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623335"},{"issue":"2014","key":"ref18","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"article-title":"Erc-897: Delegateproxy","year":"2018","author":"Jorge Izquierdo","key":"ref19"},{"article-title":"Erc-1538: Transparent contract standard","year":"2018","author":"Mudge","key":"ref20"},{"article-title":"Erc-1822: Universal upgradeable proxy standard (UUPS)","year":"2019","author":"Gabriel Barros","key":"ref21"},{"article-title":"Erc-1967: Proxy storage slot","year":"2019","author":"Santiago Palladino","key":"ref22"},{"year":"2020","key":"ref23","article-title":"Erc-2535: Diamonds, multi-facet proxy"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998191"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473929"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00047"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2011.6070393"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3561156"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3116808"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598063"},{"year":"2024","key":"ref31","article-title":"Stack exchange API"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639131"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"year":"2024","key":"ref35","article-title":"Verifying proxy contracts on Etherscan"},{"key":"ref36","first-page":"281","article-title":"Security in the software development lifecycle","volume-title":"Proc. 14th Symp. Usable Privacy Secur. (SOUPS)","author":"Assal","year":"2018"},{"year":"2024","key":"ref37","article-title":"Which is the best proxy contract?"},{"year":"2024","key":"ref38","article-title":"Ownable in upgradeable contracts"},{"year":"2024","key":"ref39","article-title":"Proxy contract delegatecall to pass a dynamic array to a function in the target contract"},{"year":"2024","key":"ref40","article-title":"Ethereum development environment for professionals"},{"year":"2024","key":"ref41","article-title":"Foundry: A blazing fast, portable and modular toolkit for Ethereum application development written in rust"},{"year":"2024","key":"ref42","article-title":"Truffle: A development environment, testing framework, and asset pipeline for Ethereum"},{"year":"2024","key":"ref43","article-title":"Brownie: A Python-based development and testing framework for smart contracts targeting the Ethereum virtual machine"},{"year":"2024","key":"ref44","article-title":"Call fallback function from eth-brownie from proxy"},{"year":"2024","key":"ref45","article-title":"How much extra gas is incurred per transaction when using a proxy contract"},{"key":"ref46","article-title":"How to splitt smart conract for reducing size of smart contract"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00050"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616270"},{"year":"2024","key":"ref49","article-title":"What does a minimal erc-1967 proxy in vyper look like"},{"year":"2024","key":"ref50","article-title":"If contracts can be proxied to other contracts, how can a user trust them?"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00087"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534372"},{"key":"ref53","first-page":"1793","article-title":"Confusum contractum: Confused deputy vulnerabilities in Ethereum smart contracts","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Gritti","year":"2023"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639140"},{"year":"2024","key":"ref55","article-title":"How to obtain the implementation address from an upgradeable proxy smart contract?"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623302"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3383422"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.2979019"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111193"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110542"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00061"},{"year":"2024","key":"ref62","article-title":"Merge OpenZeppelin 2.0 with initializer functions"},{"year":"2024","key":"ref63","article-title":"dYdX perpetual audit"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00110"},{"year":"2024","key":"ref65","article-title":"Rekt news"},{"year":"2024","key":"ref66","article-title":"SlowMist hacked database"},{"year":"2024","key":"ref67","article-title":"Compound errors - Rekt"},{"year":"2024","key":"ref68","article-title":"Dexible"},{"year":"2024","key":"ref69","article-title":"Safemoon"},{"year":"2024","key":"ref70","article-title":"Deus dao \u2013 Rekt"},{"year":"2024","key":"ref71","article-title":"Level finance - Rekt"},{"year":"2024","key":"ref72","article-title":"Astaria vulnerbaility"},{"year":"2024","key":"ref73","article-title":"OKX DEX - Rekt"},{"year":"2024","key":"ref74","article-title":"Unizen \u2013 Rekt"},{"year":"2024","key":"ref75","article-title":"How was NGFS token exploited?"},{"year":"2024","key":"ref76","article-title":"Update on the exploit and the next steps"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639117"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559384"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00024"},{"article-title":"Hyperion: Unveiling DApp inconsistencies using LLM and dataflow-guided symbolic execution","year":"2024","author":"Yang","key":"ref80"},{"year":"2024","key":"ref81","article-title":"Remix release: Support for upgradeable contracts"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598057"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639128"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/icse-companion52605.2021.00104"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3488245"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680362"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468591"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338955"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-32415-4_33"},{"key":"ref90","first-page":"333","article-title":"The sword of Damocles: Upgradeable smart contract in Ethereum","volume-title":"Proc. 32nd IEEE\/ACM Int. Conf. Program Comprehension (ICPC)","author":"Huang","year":"2024"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11251265\/11173264.pdf?arnumber=11173264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T18:45:40Z","timestamp":1763577940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11173264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":90,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3609077","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}