Can We Securely Use Approximate Computing?