Due to the fact that some firewall trust only the trust that user gives to his application, it was demonstrated that the fact of just rename a malicious program with the name of an authorized application could allow it to bypass firewall.
Lastest version of personal firewalls includes a checksum check of application and warns user when this figerprint is modified.