SPV clients don't normally carry the UTXO set around in their memory, correct?
Right the "UTXO client" we've been talking about is a different animal with a stronger security model...
SPV clients only request information on transactions involving addresses that they care about (well actually they ask for a range of address to preserve some level of anonymity).
Using the merkle tree an SPV is able to link a single transaction up the tree to the block's header. Since they do maintain the header chain of the longest blockchain, this mechanism allows them to verify for themselves the validity of a transaction. However since they do not keep data on other addresses or transactions, they are not able to verify blocks or other new transactions on the P2P network. Think of them as leaves to the network. SPV clients take information, but do not contribute to the P2P network's security in any way, they are leaches.
All full nodes maintain the full UTXO set. This is what enables them to verify blocks and new transactions on the network.
The UTXO hash clients mentioned before are still full clients. The only difference is how the node obtains the current UTXO set from the longest blockchain. One method is to download and process the complete history, another method is to download only the UTXO set (current as of block xxx) and verify that UTXO set within the current block (i.e. with a hash embedded in the block). Once done, such a node would be in the same state as another who processed the complete history and would contribute to the P2P network as a full node.
I would argue that a UTXO hash would be as secure as a coinbase transaction, which is very secure. The risk to UTXO hashes is that a miner might insert an invalid hash for a new incorrect UTXO set. Miners can do the same thing with coinbase transactions, i.e. reward themselves 1000 BTC instead of 25 BTC. But they don't because such a block is invalid and would be rejected. Same with a UTXO hash, a miner could insert an incorrect hash, but such a block is invalid and would be rejected. And if you were still worried you could always scan the complete history, there will always be some nodes who do so and who would scream if there was a falsification.