David K Pon, Age 521824 Arlington Blvd, Richmond, CA 94530

David Pon Phones & Addresses

1824 Arlington Blvd, El Cerrito, CA 94530 (415) 218-4804

Sunnyvale, CA

Eagle, ID

Grants Pass, OR

Boise, ID

San Francisco, CA

San Diego, CA

Show more

Work

Company: David pon Address: 825 Flin Way, Sunnyvale, CA 94086 Phones: (408) 735-8477 Position: Manager Industries: Soybean Oil Mills

Mentions for David K Pon

Career records & work history

Medicine Doctors

David Pon Photo 1

David Ming Pon M.P.H.

Specialties:
Ophthalmology
Education:
University of California at San Francisco (1983) Internal Medicine

License Records

David Ming Pon

Licenses:
License #: MT021048T - Expired
Category: Medicine
Type: Graduate Medical Trainee

Resumes & CV records

Resumes

David Pon Photo 21

Cofounder And Developer

Location:
1824 Arlington Blvd, El Cerrito, CA 94530
Industry:
Internet
Work:
Riskiq
Cofounder and Developer
Icrossing 2003 - 2008
Senior Engineer
Monster 2002 - 2004
Senior Programmer
Bigstep 1999 - 2001
Senior Programmer
Black Diamond Consulting Corporation 1996 - 1999
Software Engineer
Education:
Uc San Diego 1990 - 1996
Bachelors, Bachelor of Science, Computer Engineering
Languages:
English
David Pon Photo 22

David Pon

Publications & IP owners

Us Patents

Techniques For Web Framework Detection

US Patent:
2022030, Sep 22, 2022
Filed:
Jun 12, 2022
Appl. No.:
17/838241
Inventors:
- Redmond WA, US
Jonas EDGEWORTH - San Francisco CA, US
Chris KIERNAN - San Francisco CA, US
David PON - Sunnyvale CA, US
Elias MANOUSOS - San Francisco CA, US
International Classification:
G06F 40/143
G06F 16/958
G06F 40/205
G06F 40/14
H04L 9/32
Abstract:
Techniques are disclosed for analyzing documents to detect web components and the web frameworks in the documents. In at least one embodiment, a network analysis system is provided to passively detect web frameworks of documents. The network analysis system can render a document using a document object model to identify objects in the document that are defined as web components. A hash function may be applied to each of the objects to generate a hash signature for the object. Files defining web frameworks can be downloaded from a repository system. Each file may corresponding to a web component. A hash function is applied content in each file to generate a hash signature. The hash signatures of each file may be compared to the hash signatures of the objects in the document to identify a web component for each object. A web framework can be identified based on the web components.

Techniques For Determining Threat Intelligence For Network Infrastructure Analysis

US Patent:
2021031, Oct 7, 2021
Filed:
Jun 21, 2021
Appl. No.:
17/353641
Inventors:
- San Francisco CA, US
Jonas Edgeworth - San Francisco CA, US
Chris Kiernan - San Francisco CA, US
Elias Manousos - San Francisco CA, US
David Pon - Sunnyvale CA, US
International Classification:
H04L 29/06
G06F 21/51
G06F 21/56
H04L 12/24
Abstract:
Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital assets. The network analytic system can detect and track a relationship between assets based on one or more attributes related or shared between any given assets. The network analytic system can analyze network-based digital assets to determine information about a website (e.g., information about electronic documents, such as web pages) that has be used to detect phishing and other abuse of the website. The network analytic system can analyze data about network-based assets to determine whether any are being used or connected to use of unauthorized or malicious activity or known network-based assets. Based on the relationship identified, the network analytic system can associate or link assets together. The network analytic system may provide an interface to view data sets generated by the network analytic system.

Techniques For Web Framework Detection

US Patent:
2021011, Apr 15, 2021
Filed:
Dec 22, 2020
Appl. No.:
17/131620
Inventors:
- San Francisco CA, US
Jonas Edgeworth - San Francisco CA, US
Chris Kiernan - San Francisco CA, US
David Pon - Sunnyvale CA, US
Elias Manousos - San Francisco CA, US
International Classification:
G06F 40/14
G06F 16/958
G06F 40/205
H04L 9/32
Abstract:
Techniques are disclosed for analyzing documents to detect web components and the web frameworks in the documents. In at least one embodiment, a network analysis system is provided to passively detect web frameworks of documents. The network analysis system can render a document using a document object model to identify objects in the document that are defined as web components. A hash function may be applied to each of the objects to generate a hash signature for the object. Files defining web frameworks can be downloaded from a repository system. Each file may corresponding to a web component. A hash function is applied content in each file to generate a hash signature. The hash signatures of each file may be compared to the hash signatures of the objects in the document to identify a web component for each object. A web framework can be identified based on the web components.

Identifying Phishing Websites Using Dom Characteristics

US Patent:
2020020, Jun 25, 2020
Filed:
Mar 3, 2020
Appl. No.:
16/808182
Inventors:
- San Francisco CA, US
David Pon - Sunnyvale CA, US
Chris Kiernan - San Francisco CA, US
Ben Adams - San Ramos CA, US
Jonas Edgeworth - San Francisco CA, US
Elias Manousos - San Francisco CA, US
International Classification:
H04L 29/06
H04L 29/08
H04L 9/32
G06F 21/12
Abstract:
Embodiments of the present invention are directed to identifying phishing websites by rendering and analyzing document object model (DOM) objects associated with a website for features that indicate phishing behavior. Embodiments analyze the full scope and functionality associated with a website by executing functions embedded in a DOM object before analyzing the website for phishing activity. Accordingly, embodiments render and analyze a fully executed DOM object for phishing behavior. Embodiments may then perform steps to mediate a website that is classified as performing phishing. Thus, embodiments are configured to (1) collect website information from a variety of websites and web servers connected to the internet, (2) analyze the collected data to determine whether the website information is performing phishing, and (3) mediate websites and other actors that are determined to be performing phishing based on the results of the phishing analysis.

Techniques For Detecting Malicious Behavior Using An Accomplice Model

US Patent:
2020012, Apr 16, 2020
Filed:
Dec 10, 2019
Appl. No.:
16/709898
Inventors:
- San Francisco CA, US
Joseph Linn - Emeryville CA, US
Nick Goodman - San Mateo CA, US
Elias Manousos - San Francisco CA, US
Chris Kiernan - San Francisco CA, US
David Pon - Sunnyvale CA, US
Jonas Edgeworth - San Francisco CA, US
Assignee:
RISKIQ, Inc. - San Francisco CA
International Classification:
H04L 29/06
G06F 16/2457
G06F 16/955
G06F 16/951
Abstract:
The present disclosure generally relates to web page analysis, and more particularly to detecting malicious behavior using an accomplice model. In certain embodiments, the accomplice model may determine that a URI is associated with malicious behavior based upon the URI being associated with an attribute determined to be related to malicious behavior. Examples of an attribute include a host system, a domain, or an element of a document used to render the web page. Examples of an element of a document used to render the web page may include an active/dynamic element (e.g., a function, a script, etc.) or an inactive/static element (e.g., a string, a number, a frame, a tracking username, a social networking username, etc.).

Techniques For Web Framework Detection

US Patent:
2019033, Oct 31, 2019
Filed:
Jul 9, 2019
Appl. No.:
16/506968
Inventors:
- San Francisco CA, US
Jonas Edgeworth - San Francisci CA, US
Chris Kiernan - San Francisco CA, US
David Pon - Sunnyvale CA, US
Elias Manousos - San Francisco CA, US
International Classification:
G06F 17/22
G06F 16/958
G06F 17/27
H04L 9/32
Abstract:
Techniques are disclosed for analyzing documents to detect web components and the web frameworks in the documents. In at least one embodiment, a network analysis system is provided to passively detect web frameworks of documents. The network analysis system can render a document using a document object model to identify objects in the document that are defined as web components. A hash function may be applied to each of the objects to generate a hash signature for the object. Files defining web frameworks can be downloaded from a repository system. Each file may corresponding to a web component. A hash function is applied content in each file to generate a hash signature. The hash signatures of each file may be compared to the hash signatures of the objects in the document to identify a web component for each object. A web framework can be identified based on the web components.

Using Hash Signatures Of Dom Objects To Identify Website Similarity

US Patent:
2019002, Jan 24, 2019
Filed:
Sep 25, 2018
Appl. No.:
16/141917
Inventors:
- San Francisco CA, US
David Pon - Sunnyvale CA, US
Chris Kiernan - San Francisco CA, US
Ben Adams - San Ramon CA, US
Jonas Edgeworth - San Francisco CA, US
Elias Manousos - San Francisco CA, US
Joseph Linn - Emeryville CA, US
International Classification:
H04L 29/06
G06F 17/30
G06F 21/12
H04L 9/32
Abstract:
Embodiments are directed to using a hash signature of a rendered DOM object of a website to find similar content and behavior on other websites. Embodiments break a DOM into a large number of data portions (i.e., “shingles”), apply a hashing algorithm to the shingles, select a predetermined number of hashes from the hashed shingles according to a selection criteria to create a hash signature, and compare the hash signature to that of a reference page to determine similarity of website DOM object content. Embodiments can be used to identify phishing websites, defaced websites, spam websites, significant changes in the content of a webpage, copyright infringement, and any other suitable purposes related to the similarity between website DOM object content.

Techniques For Classifying A Web Page Based Upon Functions Used To Render The Web Page

US Patent:
2018012, May 3, 2018
Filed:
Nov 1, 2017
Appl. No.:
15/801247
Inventors:
- San Francisco CA, US
Joseph Linn - Emeryville CA, US
Elias Manousos - San Francisco CA, US
Chris Kiernan - San Francisco CA, US
David Pon - Sunnyvale CA, US
Jonas Edgeworth - San Francisco CA, US
Steven Alexander Daniel Pon - El Cerrito CA, US
Assignee:
RiskIQ, Inc. - San Francisco CA
International Classification:
H04L 29/06
G06F 17/30
G06F 17/22
G06K 9/62
Abstract:
The present disclosure generally relates to web page analysis, and more particularly to a classification system for web pages. The classification system may classify a web page as malicious based upon one or more signatures generated for the web page. For example, the classification system may compare one or more signatures generated for a first web page to one or more signatures generated for a second web page, where the first web page and the second web page are the same web page at different times or different web pages. Based upon a similarity of the signatures, the classification system may output whether the first web page is malicious. For another example, the classification system may include a classification model that is trained based upon one or more signatures for one or more classified web pages. The classification model may output whether the web page is malicious.

NOTICE: You may not use PeopleBackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. PeopleBackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.