Cybersecurity researchers on the College of Toronto have achieved a breakthrough in hardware-level assaults by efficiently demonstrating GPUHammer, the primary Rowhammer assault particularly focusing on discrete NVIDIA GPUs.
The analysis, which focuses on the favored NVIDIA A6000 GPU with GDDR6 reminiscence, represents a big enlargement of the decade-old Rowhammer vulnerability past conventional CPU reminiscences.
The analysis staff, led by Chris S. Lin, Joyce Qu, and Gururaj Saileshwar, overcame substantial technical challenges to realize what was beforehand thought inconceivable.
Their GPUHammer assault efficiently induced 8-bit flips throughout 4 DRAM banks on the A6000 GPU, demonstrating that Graphics-DDR (GDDR) reminiscences are certainly weak to the identical disturbance assaults which have plagued CPU reminiscences for years.
“That is the primary systematic Rowhammer marketing campaign on NVIDIA GPUs,” the researchers said of their paper. The assault required creating novel strategies, together with reverse-engineering proprietary GDDR DRAM row mappings and creating GPU-specific reminiscence entry optimizations to amplify hammering depth.
Actual-World Influence on AI Methods
The implications lengthen far past tutorial analysis. The staff demonstrated that these bit-flips may cause devastating accuracy degradation in machine studying fashions, with drops of as much as 80% noticed throughout standard neural networks, together with AlexNet, VGG16, ResNet50, DenseNet161, and InceptionV31.
This vulnerability is especially regarding provided that GPUs energy nearly all of AI inference workloads in each cloud and enterprise environments.
The assault targets essentially the most important little bit of the exponent in FP16-representation weights, exponentially altering parameter values and dramatically lowering mannequin accuracy. In some circumstances, fashions with 80% baseline accuracy had been lowered to lower than 0.5% accuracy with a single strategically positioned bit-flip1.
The researchers confronted distinctive obstacles in adapting conventional Rowhammer strategies to GPU architectures. GPUs have roughly 4× larger reminiscence latency in comparison with CPUs and sooner refresh charges, making typical hammering approaches ineffective.
The staff solved this by creating parallelized hammering kernels that leverage GPU throughput capabilities, attaining activation charges near 500,000 activations per refresh window1.
Moreover, the proprietary nature of GPU reminiscence mappings required progressive reverse-engineering approaches. Not like CPUs the place bodily addresses are accessible, NVIDIA GPUs preserve these mappings personal, forcing researchers to develop new strategies for figuring out weak reminiscence locations1.
NVIDIA’s Response and Mitigation
Following accountable disclosure on January 15, 2025, NVIDIA issued a complete safety advisory acknowledging the vulnerability. The corporate emphasised that System-Stage ECC successfully mitigates the assault when enabled, although this safety comes with roughly 6.5% reminiscence overhead and 3-10% efficiency impact1.
NVIDIA’s advisory covers a number of GPU generations, together with Blackwell, Ada, Hopper, Ampere, Jetson, Turing, and Volta architectures. The corporate strongly recommends enabling System-Stage ECC on skilled and knowledge middle merchandise, noting that it’s enabled by default on Hopper and Blackwell knowledge middle GPUs.
For newer GPU generations, On-Die ECC (OD-ECC) supplies further safety. This know-how is mechanically enabled on supported units, together with RTX 50 sequence client playing cards and the most recent knowledge middle merchandise, providing built-in resistance to Rowhammer assaults.
The analysis highlights a vital hole in GPU safety as these processors turn into more and more central to AI and high-performance computing. With NVIDIA commanding roughly 90% of the GPU market share, the vulnerability probably impacts tens of millions of programs worldwide.
The timing is especially important as cloud suppliers more and more provide GPU time-sharing providers, creating multi-tenant environments the place malicious actors might probably goal different customers’ AI fashions or delicate knowledge residing in GPU reminiscence.
Whereas the researchers centered on the A6000 GPU, related vulnerabilities might exist throughout different GPU architectures and reminiscence sorts. The staff famous that A100 GPUs with HBM2e reminiscence and RTX 3080 units confirmed no bit-flips of their testing, although this can be resulting from completely different threshold ranges or enhanced mitigations reasonably than immunity.
The analysis underscores the significance of hardware-level safety concerns in AI system design and the necessity for strong mitigation methods as GPU computing continues to develop throughout vital functions.
Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now