Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

First Rowhammer Attack Targeting NVIDIA GPUs

Posted on July 12, 2025July 12, 2025 By CWS

Cybersecurity researchers on the College of Toronto have achieved a breakthrough in hardware-level assaults by efficiently demonstrating GPUHammer, the primary Rowhammer assault particularly focusing on discrete NVIDIA GPUs.

The analysis, which focuses on the favored NVIDIA A6000 GPU with GDDR6 reminiscence, represents a big enlargement of the decade-old Rowhammer vulnerability past conventional CPU reminiscences.

The analysis staff, led by Chris S. Lin, Joyce Qu, and Gururaj Saileshwar, overcame substantial technical challenges to realize what was beforehand thought inconceivable.

Their GPUHammer assault efficiently induced 8-bit flips throughout 4 DRAM banks on the A6000 GPU, demonstrating that Graphics-DDR (GDDR) reminiscences are certainly weak to the identical disturbance assaults which have plagued CPU reminiscences for years.

“That is the primary systematic Rowhammer marketing campaign on NVIDIA GPUs,” the researchers said of their paper. The assault required creating novel strategies, together with reverse-engineering proprietary GDDR DRAM row mappings and creating GPU-specific reminiscence entry optimizations to amplify hammering depth.

Actual-World Influence on AI Methods

The implications lengthen far past tutorial analysis. The staff demonstrated that these bit-flips may cause devastating accuracy degradation in machine studying fashions, with drops of as much as 80% noticed throughout standard neural networks, together with AlexNet, VGG16, ResNet50, DenseNet161, and InceptionV31.

This vulnerability is especially regarding provided that GPUs energy nearly all of AI inference workloads in each cloud and enterprise environments.

The assault targets essentially the most important little bit of the exponent in FP16-representation weights, exponentially altering parameter values and dramatically lowering mannequin accuracy. In some circumstances, fashions with 80% baseline accuracy had been lowered to lower than 0.5% accuracy with a single strategically positioned bit-flip1.

The researchers confronted distinctive obstacles in adapting conventional Rowhammer strategies to GPU architectures. GPUs have roughly 4× larger reminiscence latency in comparison with CPUs and sooner refresh charges, making typical hammering approaches ineffective.

The staff solved this by creating parallelized hammering kernels that leverage GPU throughput capabilities, attaining activation charges near 500,000 activations per refresh window1.

Moreover, the proprietary nature of GPU reminiscence mappings required progressive reverse-engineering approaches. Not like CPUs the place bodily addresses are accessible, NVIDIA GPUs preserve these mappings personal, forcing researchers to develop new strategies for figuring out weak reminiscence locations1.

NVIDIA’s Response and Mitigation

Following accountable disclosure on January 15, 2025, NVIDIA issued a complete safety advisory acknowledging the vulnerability. The corporate emphasised that System-Stage ECC successfully mitigates the assault when enabled, although this safety comes with roughly 6.5% reminiscence overhead and 3-10% efficiency impact1.

NVIDIA’s advisory covers a number of GPU generations, together with Blackwell, Ada, Hopper, Ampere, Jetson, Turing, and Volta architectures. The corporate strongly recommends enabling System-Stage ECC on skilled and knowledge middle merchandise, noting that it’s enabled by default on Hopper and Blackwell knowledge middle GPUs.

For newer GPU generations, On-Die ECC (OD-ECC) supplies further safety. This know-how is mechanically enabled on supported units, together with RTX 50 sequence client playing cards and the most recent knowledge middle merchandise, providing built-in resistance to Rowhammer assaults.

The analysis highlights a vital hole in GPU safety as these processors turn into more and more central to AI and high-performance computing. With NVIDIA commanding roughly 90% of the GPU market share, the vulnerability probably impacts tens of millions of programs worldwide.

The timing is especially important as cloud suppliers more and more provide GPU time-sharing providers, creating multi-tenant environments the place malicious actors might probably goal different customers’ AI fashions or delicate knowledge residing in GPU reminiscence.

Whereas the researchers centered on the A6000 GPU, related vulnerabilities might exist throughout different GPU architectures and reminiscence sorts. The staff famous that A100 GPUs with HBM2e reminiscence and RTX 3080 units confirmed no bit-flips of their testing, although this can be resulting from completely different threshold ranges or enhanced mitigations reasonably than immunity.

The analysis underscores the significance of hardware-level safety concerns in AI system design and the necessity for strong mitigation methods as GPU computing continues to develop throughout vital functions.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now 

Cyber Security News Tags:Attack, GPUs, Nvidia, Rowhammer, Targeting

Post navigation

Previous Post: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs
Next Post: WordPress GravityForms Plugin Hacked to Include Malicious Code

Related Posts

New Spear-Phishing Attack Targeting Financial Executives by Deploying NetBird Malware Cyber Security News
Gunra Ransomware Group Leaks 40TB of Data from American Hospital Cyber Security News
ServiceNow Platform Vulnerability Let Attackers Exfiltrate Sensitive Data Cyber Security News
PoC Published For Fortinet 0-Day Vulnerability That Being Exploited in the Wild Cyber Security News
Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Cyber Security News
United Natural Foods Suffers Cyberattack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Monitor Your Identity on the Dark Web
  • Meta’s Llama Firewall Bypassed Using Prompt Injection Vulnerability
  • OpenAI is to Launch a AI Web Browser in Coming Weeks
  • WordPress GravityForms Plugin Hacked to Include Malicious Code
  • First Rowhammer Attack Targeting NVIDIA GPUs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News