RowHammer is a circuit-level DRAM vulnerability, rst rigorously analyzed and introduced in 2014, where repeatedly accessing data in a DRAM row can cause bit ips in nearby rows. The RowHammer vulnerability has since garnered signi cant interest in both computer architecture and computer security research communities because it stems from physical circuit-level interference e ects that worsen with continued DRAM density scaling. As DRAM manufacturers primarily depend on density scaling to increase DRAM capacity, future DRAM chips will likely be more vulnerable to RowHammer than those of the past. Many RowHammer mitigation mechanisms have been proposed by both industry and academia, but it is unclear whether these mechanisms will remain viable solutions for future devices, as their overheads increase with DRAM's vulnerability to RowHammer.In order to shed more light on how RowHammer a ects modern and future devices at the circuit-level, we rst present an experimental characterization of RowHammer on 1580 DRAM chips (408× DDR3, 652× DDR4, and 520× LPDDR4) from 300 DRAM modules (60× DDR3, 110× DDR4, and 130× LPDDR4) with RowHammer protection mechanisms disabled, spanning multiple di erent technology nodes from across each of the three major DRAM manufacturers. Our studies de nitively show that newer DRAM chips are more vulnerable to RowHammer: as device feature size reduces, the number of activations needed to induce a RowHammer bit ip also reduces, to as few as 9.6k (4.8k to two rows each) in the most vulnerable chip we tested.We evaluate ve state-of-the-art RowHammer mitigation mechanisms using cycle-accurate simulation in the context of real data taken from our chips to study how the mitigation mechanisms scale with chip vulnerability. We nd that existing mechanisms either are not scalable or su er from prohibitively large performance overheads in projected future devices given our observed trends of RowHammer vulnerability. Thus, it is critical to research more e ective solutions to RowHammer.