{"id":4825,"date":"2025-07-12T18:10:04","date_gmt":"2025-07-12T18:10:04","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/4825\/"},"modified":"2025-07-12T18:10:04","modified_gmt":"2025-07-12T18:10:04","slug":"new-rowhammer-attack-variant-degrades-ai-models-on-nvidia-gpus","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/4825\/","title":{"rendered":"New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs"},"content":{"rendered":"<p>\ue802Jul 12, 2025\ue804Ravie LakshmananAI Security \/ Vulnerability<\/p>\n<p><a href=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/gpu-hammer.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/gpu-hammer.jpg\" alt=\"New RowHammer Attack on NVIDIA GPUs\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\" title=\"New RowHammer Attack on NVIDIA GPUs\"\/><\/a><\/p>\n<p>NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated against its graphics processing units (GPUs).<\/p>\n<p>&#8220;Risk of successful exploitation from RowHammer attacks varies based on DRAM device, platform, design specification, and system settings,&#8221; the GPU maker <a href=\"https:\/\/nvidia.custhelp.com\/app\/answers\/detail\/a_id\/5671\" rel=\"noopener nofollow\" target=\"_blank\">said<\/a> in an advisory released this week.<\/p>\n<p>Dubbed <a href=\"https:\/\/gpuhammer.com\" rel=\"noopener nofollow\" target=\"_blank\">GPUHammer<\/a>, the attacks mark the first-ever RowHammer exploit demonstrated against NVIDIA&#8217;s GPUs (e.g., NVIDIA A6000 GPU with GDDR6 Memory), causing malicious GPU users to tamper with other users&#8217; data by triggering bit flips in GPU memory.<\/p>\n<p>The most concerning consequence of this behavior, University of Toronto researchers found, is the degradation of an artificial intelligence (AI) model&#8217;s accuracy from 80% to less than 1%.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/tprm-guide-v2\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/audit-2-d.png\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p><a href=\"https:\/\/arxiv.org\/abs\/2211.07613\" rel=\"noopener nofollow\" target=\"_blank\">RowHammer<\/a> is to modern DRAMs just like how <a href=\"https:\/\/thehackernews.com\/2024\/10\/new-research-reveals-spectre.html\" rel=\"noopener nofollow\" target=\"_blank\">Spectre and Meltdown<\/a> are to contemporary CPUs. While both are hardware-level security vulnerabilities, RowHammer targets the physical behavior of DRAM memory, whereas Spectre <a href=\"https:\/\/thehackernews.com\/2025\/05\/researchers-expose-new-intel-cpu-flaws.html\" rel=\"noopener nofollow\" target=\"_blank\">exploits<\/a> speculative execution in CPUs.<\/p>\n<p>RowHammer <a href=\"https:\/\/thehackernews.com\/2024\/03\/new-zenhammer-attack-bypasses-rowhammer.html\" rel=\"noopener nofollow\" target=\"_blank\">causes<\/a> bit flips in nearby memory cells due to electrical interference in DRAM stemming from repeated memory access, while <a href=\"https:\/\/www.redhat.com\/en\/blog\/what-are-meltdown-and-spectre-heres-what-you-need-know\" rel=\"noopener nofollow\" target=\"_blank\">Spectre and Meltdown<\/a> allow attackers to <a href=\"https:\/\/thehackernews.com\/2021\/05\/new-spectre-flaws-in-intel-and-amd-cpus.html\" rel=\"noopener nofollow\" target=\"_blank\">obtain privileged information<\/a> from memory via a side-channel attack, potentially leaking sensitive data.<\/p>\n<p>In 2022, academics from the University of Michigan and Georgia Tech described a technique called <a href=\"https:\/\/ieeexplore.ieee.org\/document\/9833802\" rel=\"noopener nofollow\" target=\"_blank\">SpecHammer<\/a> that combines RowHammer and Spectre to launch speculative attacks. The approach essentially entails triggering a Spectre v1 attack by using Rowhammer bit-flips to insert malicious values into victim gadgets.<\/p>\n<p>GPUHammer is the latest variant of RowHammer, but one that&#8217;s capable of inducing bit flips in NVIDIA GPUs despite the presence of mitigations like target refresh rate (TRR).<\/p>\n<p>In a proof-of-concept developed by the researchers, using a single-bit flip to tamper with a victim&#8217;s ImageNet deep neural network (DNN) models can degrade model accuracy from 80% to 0.1%.<\/p>\n<p><a href=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/data.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/data.png\" alt=\"\" border=\"0\" data-original-height=\"502\" data-original-width=\"1680\"\/><\/a><\/p>\n<p>Exploits like GPUHammer threaten the integrity of AI models, which are increasingly reliant on GPUs to perform parallel processing and carry out computationally demanding tasks, not to mention open up a new attack surface for cloud platforms.<\/p>\n<p>To mitigate the risk posed by GPUHammer, it&#8217;s advised to enable ECC through &#8220;nvidia-smi -e 1.&#8221; Newer NVIDIA GPUs like H100 or RTX 5090 are not affected due to them featuring <a href=\"https:\/\/ieeexplore.ieee.org\/document\/8809496\" rel=\"noopener nofollow\" target=\"_blank\">on-die ECC<\/a>, which helps <a href=\"https:\/\/arxiv.org\/abs\/2204.10387\" rel=\"noopener nofollow\" target=\"_blank\">detect and correct errors<\/a> arising due to voltage fluctuations associated with smaller, denser memory chips.<\/p>\n<p><a href=\"https:\/\/thehackernews.uk\/legacy-security-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/07\/zz-2-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/p>\n<p>&#8220;Enabling Error Correction Codes (ECC) can mitigate this risk, but ECC can introduce up to a 10% slowdown for [machine learning] inference workloads on an A6000 GPU,&#8221; Chris (Shaopeng) Lin, Joyce Qu, and Gururaj Saileshwar, the lead authors of the study, said, adding it also reduces memory capacity by 6.25%.<\/p>\n<p>The disclosure comes as researchers from NTT Social Informatics Laboratories and CentraleSupelec presented CrowHammer, a type of RowHammer attack that enables a key recovery attack against the <a href=\"https:\/\/falcon-sign.info\" rel=\"noopener nofollow\" target=\"_blank\">FALCON<\/a> (FIPS 206) <a href=\"https:\/\/pqshield.com\/falcon-a-post-quantum-signature-scheme\/\" rel=\"noopener nofollow\" target=\"_blank\">post-quantum signature scheme<\/a>, which has been <a href=\"https:\/\/thehackernews.com\/2024\/09\/google-chrome-switches-to-ml-kem-for.html\" rel=\"noopener nofollow\" target=\"_blank\">selected<\/a> by NIST for standardization. <\/p>\n<p>&#8220;Using RowHammer, we target Falcon&#8217;s RCDT [reverse cumulative distribution table] to trigger a very small number of targeted bit flips, and prove that the resulting distribution is sufficiently skewed to perform a key recovery attack,&#8221; the study said.<\/p>\n<p>&#8220;We show that a single targeted bit flip suffices to fully recover the signing key, given a few hundred million signatures, with more bit flips enabling key recovery with fewer signatures.&#8221;<\/p>\n<p>Found this article interesting?  Follow us on <a href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener nofollow\" target=\"_blank\">Twitter \uf099<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener nofollow\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<br \/>\n<script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"\ue802Jul 12, 2025\ue804Ravie LakshmananAI Security \/ Vulnerability NVIDIA is urging customers to enable System-level Error Correction Codes (ECC)&hellip;\n","protected":false},"author":2,"featured_media":4826,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[182,181,507,5407,5400,5393,5392,5394,5395,5396,5401,5397,5398,5403,5405,5404,5402,5399,74,5406],"class_list":{"0":"post-4825","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-computer-security","12":"tag-cyber-attacks","13":"tag-cyber-news","14":"tag-cyber-security-news","15":"tag-cyber-security-news-today","16":"tag-cyber-security-updates","17":"tag-cyber-updates","18":"tag-data-breach","19":"tag-hacker-news","20":"tag-hacking-news","21":"tag-how-to-hack","22":"tag-information-security","23":"tag-network-security","24":"tag-ransomware-malware","25":"tag-software-vulnerability","26":"tag-technology","27":"tag-the-hacker-news"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/4825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=4825"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/4825\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/4826"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=4825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=4825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=4825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}