Research Article

Attacker Traceability on Ethereum through Graph Analysis

Figure 6

The relation of reentry attack.