Fig. 2. A simplified diagram of a compromised BCI system. We distinguish between two types of attackers: (1) an attacker who exploits the legitimate feature
extraction and decoding (translation) algorithms (denoted as solid color blocks in the diagram), and (2) an attacker who implements additions algorithms for
malicious applications and either replaces or supplements the legitimate BCI resources (denoted as dotted-background blocks in the diagram).