Methods of Extracting Private Information
We consider scenarios where an attacker interacts with
users by presenting them with specific sets of stimuli, and
recording their responses to the presented stimuli. In the
current literature, there are several well-established methods
of presenting stimuli to users: