An attacker exploiting the GPUhammer will quickly flip the bits, which have access to them to impress other memory bits, in which they have no access, Ularich explained. NVIDIA ECC recommends enabling error correction, which will detect these unauthorized changes in memory material and possibly stop. ECC is not correct, he said, but if there is a possibility of being enabled, then exploitation will make it less practical.
The attack also requires the attacker to execute specific codes, he said. This is a threat to those systems that are shared among users and allow various users to affect each other data compared to single user systems, they said.
He said that the paper of researchers states that some abstraction of graphics cards has made me a little more difficult to reach the memory to trigger Rahaymer exploitation. Unlike DDR memory attached to normal CPU buses, GPU has more controlled access to memory. “But in the end,” he said, “All Rowhammer needs need to quickly flip and close specific bits, which is still possible for GPU. It just works more to find out which bits to flip, which is the main contribution of paper.”