For one, identifying said trojans would be a good reason alone--but you should also consider zero-day exploits. So long as you can root a device, you also have exploits (the two go hand-in-hand). rageagainstthecage is how Droid people root their handsets, but it's also precisely how that last HUGE bunch of trojans also managed to quietly root and take hold.