Security Threats in Approximate Computing Systems