I Stolenly Swear That I Am Up to (No) Good: Design and Evaluation of Model Stealing Attacks