The focus is on USB, PCI, and other buses where devices can retain a persistent state and become attack vectors-even across reboots. The solution proposes that when an unauthorized device is detected, it should be excluded from the host system but made available to an isolated VM. The presentation goes into concrete design assumptions, and the technical details of how such port-level quarantine could be implemented in firmware and OS layers.




