Verified boot in Oracle Solaris secures a system's boot process. The feature protects the system from threats such as the following:
Corruption of kernel modules
Insertion or substitution of malicious programs that masquerade as legitimate kernel modules, such as Trojan viruses, spyware, and rootkits
Installation of unauthorized third-party kernel modules
Malicious programs can pass information to third parties as well as alter the behavior of Oracle Solaris. Although third-party modules are typically non-malicious, they might violate policies that control site changes. Therefore, the system also needs protection from unauthorized installation of these modules.