ROMAD
ROMAD
Token: RDT


The Next-Generation Antivirus

ICO dates
Start date: 2018-05-27
End date:

Registrated in: Switzerland

Platform: Ethereum
Type: ERC20

PREMIUM ICO

HARA

Empowering billions by utilizing a global and transparent data exchange.
Ends in 173 days 8 hours
Goal: 17,000,000 USD
Price: 1 HART = 0.059 USD

Dominium

Dominium Blockchain – The one-stop-platform for everything to do with property anywhere in the world!
Ends in 142 days 8 hours
Goal: 17,500,000 USD
Price: 1 DOM = 0.25 EUR
ROMAD categories
Big Data Real estate
ROMAD whitepaper
Video
ROMAD token sale
KYC passing required Yes | Whitelist Yes | Restriction for countries No
Minimal investment 100 RDT
Acceppting ETH, BTC, LTC, Fiat
ROMAD news, social
ROMAD search trends in Google
Random whitepaper excerpts

Romad whitepaper
Content
Thesaurus
4
Introduction
6
ROMAD overview
6
Summary
6
Internet and security
7
Cybercrime growth
7
The illusion of security
7
Malware - the main cyberthreat source
8
Why classic AVs do not work
9
Product
11
ROMAD: the revolutionary way to protect
11
Rewards
12
How ROMAD Endpoint Defense works
13
Use-case: petya/notpetya/badrabbit/mamba/redboot
17
Use-case: cryptocurrency miners
18
The blockchain technology usage
20
Blockchain 3.0
20
Competitive advantages
21
Preventing 0-day threats
26
ROMAD platform overview
28
How it works
28
How to use the ROMAD’s license
28
How to protect your own PC
28
How to distribute your license
29
How to pass your license to the ROMAD Marketplace
29
How to...

Romad whitepaper
Legal disclaimer
40
General warning
40
Regional and personal restrictions
40
Legal and regulatory warning
41
Financial warning
41
Disclaimer of liability
41
Provisions regarding IP rights
42
Tax warning
42
Force-majeure
42
Final warning
42
References
43
3
...

Romad whitepaper
Thesaurus
Add-on
— application that can be installed for certain software to improve and extend its
functionality.
Antivirus of the next generation (NGAV)
— antivirus that uses the principally new approach to
detect and repel the malware attacks
1
,
2
,
3
. This often includes BigData and Artificial Intelligence
(AI) methods.
Attack
— the record that ROMAD Endpoint Defense writes on the blockchain; the record contains
the information about the software actions unauthorized by an owner/user of the device that can
cause damage to an owner/user of the device as well as alter in any other way the data stored on
such device.
Defense token or RDT
— token issued by ROMAD Company that contains an embedded license for
the next-generation antivirus software ROMAD Endpoint Defense.
Digital signature
— requisite of the electronic document that intends to verify this document and
allows ...

Romad whitepaper
Stack
(in this context) — special Windows memory area.
System calls
— software calls to the operating system kernel.
Token generation event or TGE
— primary sale of ROMAD tokens.
End user
— person that activates the license, uses ROMAD Endpoint Defense.
Malware strain
— modified malware file. The file’s attributes are altered in order to avoid the
antivirus attention.
0-day family
— family that was not previously distributed.
0-day attack
— attack that no one met before.
5
...

Romad whitepaper
Introduction
ROMAD overview
ROMAD offers the next generation antivirus
ROMAD Endpoint Defense
and the
Defense token (RDT).
ROMAD Endpoint Defense
is the fully functional next generation antivirus that is using innovative
patented approach to chase the malware. It is the revolutionary approach to cybersecurity. This
cutting edge malware behavioral analysis tool classifies hundreds of millions of malware strains
according to their genetic code and identifies the families that they belong to. There are no new
strains for ROMAD; they will be discovered and eradicated immediately.
ROMAD Endpoint Defense is already working on the enterprise markets of Ukraine and Malaysia.
ROMAD Endpoint Defense antivirus successfully protects thouthands of the enterprise endpoints.
ROMAD had won Cyber Security Shark Tank in US multiple times.
ROMAD offers a unique distribution business model. The antivirus is distributed completely free of
charge. The end users are...

Romad whitepaper
Internet and security
Cybercrime growth
The digital security is of the vital essence these days.
As more and more data are being digitized, the number of cyberthreats grows. Hackers are aiming
IoT and smart houses. The blockchain also introduces many new security challenges. The smart-
contracts that are impossible to update are one of them. A single bug within a smart-contract of
a successful ICO may make a cybercrime group rich. Thus there is no doubt the cryptocurrencies
attract cybercriminals.
Symantec foresees the following trends
4
:
z
z hackers are to aim the cryptocurrencies.
z
z
cybercrime is to use artificial intelligence (AI) for the malware attacks.
McAfee thinks the ransomware will come up with the new and creative ways in extorting money.
Now the focus is on the cryptocurrencies hijacking or cryptojacking.
5
It is generally thought the cyberattacks are going to grow in the foreseeable future. The digital
...

Romad whitepaper
Malware - the main cyberthreat source
Today malware is the main cyberthreat. AV industry efforts are focused on fighting it.
The malware diversity is described in terms of the different malware families. The families share
the same “DNA”. The outer look of the same malware family is changing, thus creating the endless
malware strains. This reminds the real life when we get sick with the flu. The “DNA” of the flu largely
remains intact. The outer layer changes so that our immune system fails to discover it in timely
manner. This process repeats over and over again as the next winter comes. The same situation
happens in the malware world.
The AV-TEST data proves there is a huge growth of the strains
10
:
z
z There are more than 750 mil malware strains as of 2018.
z
z Each second 4 new malware strains are released.
8
...

Romad whitepaper
Why classic AVs do not work
The classic AVs chase the individual strains. This is why they need the time to describe each strain.
This is how the process looks like:
z
z The AV laboratory gets the new malware sample. This mostly occurs after the attack has
happened already. The irreversible damage has already occured.
z
z The sample gets processed.
z
z The static signature is created and is pushed to the end users.
Sometimes the whole process takes a couple of hours, sometimes it takes a couple of months.
While the AVs are chasing this specific sample, the new one arrives. This effectively means the PC
is never, in fact, protected.
The classic AVs are always one step behind. The users are never secure.
Let’s look at the typical scenario. Alice woke up and decided to check her email box. She found the
email with the sbj: “Vacation plans for 2018”.
Alice was so impatient to figure out when her vacation would begin so she opened an email. It
Andrii Yrchenko
Andrii Yrchenko Country manager Malaysia

IIIia Salata
IIIia Salata Sales lead Malaysia

Katya Semenova
Katya Semenova Country manager Ukraine

Andrii Ovcharenko
Andrii Ovcharenko Blockchain Development manager

Elena Lusta
Elena Lusta Integration manager

Alexander Sorokin
Alexander Sorokin Server-side development manager

Taras Rudenko
Taras Rudenko Support manager

Anatolii Sviridenkov
Anatolii Sviridenkov Client manager

Dmitriy Rusin
Dmitriy Rusin Genetic sequences division manager

Vitalii Yeremenko
Vitalii Yeremenko Deployer development manager

Aleksey Pavlov
Aleksey Pavlov Senior Developer

Oleksii Duvanov
Oleksii Duvanov Senior Developer

Tigran Apozyan
Tigran Apozyan Senior AI Developer

Andrei Sydiuk
Andrei Sydiuk Senior AI Developer

Alexander Sirenko
Alexander Sirenko System Administrator

Anton Kurnosov
Anton Kurnosov System Administrator

Aleksey Oleynikov
Aleksey Oleynikov Server maintenance

Mykhaylov Lyhyrda
Mykhaylov Lyhyrda XEN factory maintenance

Gleb Lamm
Gleb Lamm Senior system call interception platform developer

Yurii Zilinskyi
Yurii Zilinskyi Senior system call interception platform developer

Vitali
Vitali Senior QA

Leonid Sanopulos
Leonid Sanopulos Intermediate QA

Ruslan Tsventarniy
Ruslan Tsventarniy Senior Genetic sequences developer

Sergey Matushenco
Sergey Matushenco Intermediate Genetic sequences developer

Oleg Kalinin
Oleg Kalinin Intermediate Genetic sequences developer

Vitalii Liakhovyi
Vitalii Liakhovyi Intermediate QA

Andrei Ivlev
Andrei Ivlev Senior Developer

Ismail Malik
Advisors Ismail Malik Advisor

Kirill Kazakov
Advisors Kirill Kazakov Advisor

Denis Dovgopoliy
Advisors Denis Dovgopoliy Advisor

Darren Franceschini
Advisors Darren Franceschini Advisor

Evgeny Tumoyan
Evgeny Tumoyan
CTO
Andrii Yrchenko
Andrii Yrchenko
Country manager Malaysia
Country manager Malaysia
IIIia Salata
IIIia Salata
Sales lead Malaysia
Sales lead Malaysia
Katya Semenova
Katya Semenova
Country manager Ukraine
Country manager Ukraine
Alexander Artmenko
Alexander Artmenko
BDM
Andrii Ovcharenko
Andrii Ovcharenko
Blockchain Development manager
Blockchain Development manager
Elena Lusta
Elena Lusta
Integration manager
Integration manager
Alexander Sorokin
Alexander Sorokin
Server-side development manager
Server-side development manager
Taras Rudenko
Taras Rudenko
Support manager
Anatolii Sviridenkov
Anatolii Sviridenkov
Client manager
Dmitriy Rusin
Dmitriy Rusin
Genetic sequences division manager
Genetic sequences division manager
Vitalii Yeremenko
Vitalii Yeremenko
Deployer development manager
Deployer development manager
Aleksey Pavlov
Aleksey Pavlov
Senior Developer
Oleksii Duvanov
Oleksii Duvanov
Senior Developer
Tigran Apozyan
Tigran Apozyan
Senior AI Developer
Senior AI Developer
Andrei Sydiuk
Andrei Sydiuk
Senior AI Developer
Senior AI Developer
Alexander Sirenko
Alexander Sirenko
System Administrator
System Administrator
Anton Kurnosov
Anton Kurnosov
System Administrator
System Administrator
Aleksey Oleynikov
Aleksey Oleynikov
Server maintenance
Server maintenance
Mykhaylov Lyhyrda
Mykhaylov Lyhyrda
XEN factory maintenance
XEN factory maintenance
Svyatoslav Kolyada
Svyatoslav Kolyada
Juniour QA
Gleb Lamm
Gleb Lamm
Senior system call interception platform developer
Senior system call interception platform developer
Yurii Zilinskyi
Yurii Zilinskyi
Senior system call interception platform developer
Senior system call interception platform developer
Vitali
Vitali
Senior QA
Leonid Sanopulos
Leonid Sanopulos
Intermediate QA
Ruslan Tsventarniy
Ruslan Tsventarniy
Senior Genetic sequences developer
Senior Genetic sequences developer
Sergey Matushenco
Sergey Matushenco
Intermediate Genetic sequences developer
Intermediate Genetic sequences developer
Oleg Kalinin
Oleg Kalinin
Intermediate Genetic sequences developer
Intermediate Genetic sequences developer
Vitalii Liakhovyi
Vitalii Liakhovyi
Intermediate QA
Andrei Ivlev
Andrei Ivlev
Senior Developer
Ismail Malik
Ismail Malik
Advisor
Britain Co-founder
BlockchainLab Founder
Blockchain R&D and ICO Advisor
Blockchain R&D + ICO Strategist
Advisor
Blockchain R&D, ICO Strategist BlockchainLab
Editor In Chief ICO Crowd
ICO Marketing Advisor
Marketing & PR Adviser
Advisor
Marketing Advisor
Blockchain and media advisor
Blockchain Advisor
CEO of Blockchain
Crypto media: ICO Crowd London, United Kingdom
Blockchain R&D, ICO Strategist BlockchainLab
Advisor
Kirill Kazakov
Kirill Kazakov
Advisor
Denis Dovgopoliy
Denis Dovgopoliy
Advisor
Founder at GrowthUP Group, investor, advisory
Darren Franceschini
Darren Franceschini
Advisor