Blurring Boundaries: A New Way to Secure Approximate Computing Systems