As depicted in Figure 1, a typical BCI system consists of
three main components: (R1) an acquisition system, (R2) an
application, and (R34) a signal processing system, where the
signal processing system consists of (R3) feature extraction
and (R4) decoding (translation) algorithm components. The
existing BCI open-development platforms typically grant every
application developer full control over all four of these components.
For the discussion of this paper, we will assume an
attacker has an access to all of these resources (R1)–(R4). We
next consider how an attacker uses these resources to develop
malicious applications.