The document discusses the motivation, goals, background, architecture, evaluation plan, and plan of work for a system called the Rapid Recovery System that aims to provide strong protection of user data and rapid recovery from attacks through the use of virtual machine isolation and rollback capabilities. The system would isolate user data and applications into separate virtual machines with strict access controls to prevent malware from compromising data or taking control of the system, and allow quick restoration to previous known-good states. Evaluation of the system would assess its effectiveness against various attack scenarios, performance overhead, and ability to facilitate forensic analysis after attacks.