“…Authentication with a stationary phone may indicate that a relay attack is occurring. Other works have utilized microphone signals [18], [22], sensor data [23], [24], and localization data [19], [20]. Contextualization does not work with every device (e.g., lacking sensors), is vulnerable to spoofing [19], [25], and may yield high false-positives if the context is irrelevant or inapplicable.…”