📢 Gate Square #Creator Campaign Phase 1# is now live – support the launch of the PUMP token sale!
The viral Solana-based project Pump.Fun ($PUMP) is now live on Gate for public sale!
Join the Gate Square Creator Campaign, unleash your content power, and earn rewards!
📅 Campaign Period: July 11, 18:00 – July 15, 22:00 (UTC+8)
🎁 Total Prize Pool: $500 token rewards
✅ Event 1: Create & Post – Win Content Rewards
📅 Timeframe: July 12, 22:00 – July 15, 22:00 (UTC+8)
📌 How to Join:
Post original content about the PUMP project on Gate Square:
Minimum 100 words
Include hashtags: #Creator Campaign
GPUHammer Attack On NVIDIA GPUs Can Destroy AI Model Accuracy
HomeNews* NVIDIA GPUs are at risk from a new RowHammer-based security attack called GPUHammer.
The vulnerability enables a malicious GPU user to affect another user’s data in shared systems. “Enabling Error Correction Codes (ECC) can mitigate this risk, but ECC can introduce up to a 10% slowdown for [machine learning] inference workloads on an A6000 GPU,” noted study authors Chris Lin, Joyce Qu, and Gururaj Saileshwar. They also reported that using ECC reduces memory capacity by around 6.25%.
RowHammer attacks use repeated memory access to induce bit flips due to electrical interference in DRAM. Similar to how the Spectre and Meltdown vulnerabilities target CPUs, RowHammer targets memory chips inside computers or GPUs. The GPUHammer variant works against NVIDIA GPUs despite earlier defenses such as Target Row Refresh (TRR). In one proof-of-concept, researchers reduced an ImageNet deep neural network’s accuracy from 80% to less than 1% using a single targeted bit flip.
Users of new NVIDIA hardware like the H100 or RTX 5090 are not at risk due to on-die ECC, which can automatically detect and correct memory errors. The recommended defense for older GPUs is to activate ECC through the “nvidia-smi -e 1” command as described in NVIDIA’s official advisory.
In separate news, a similar RowHammer technique called CrowHammer was able to attack the FALCON post-quantum signature scheme, selected by NIST as a standard. Researchers showed that a specific bit flip could allow a Hacker to recover cryptographic signing keys from affected systems.
These new findings reveal that hardware-level attacks continue to pose challenges for both AI and cryptographic security, especially as memory chips become smaller and more densely packed.