The second type of an attacker extracts users’ private information
by adding or replacing the legitimate BCI components.
Such an attacker implements additional feature extraction and
decoding algorithms, and either replaces or supplements the
existing BCI components with the additional malicious code.
As can be observed from the Figure, the difference between
the two attacker types is only in the structure of the “brain
malware” component.