This paper presents a full system architecture allowing the authentication and secured execution of binary files using hardware-assisted on-the-fly memory encryption/decryption. In a context of general blurring of the physical relationship between a user and the computer which which it eventually interacts, this architecture has been thought so as to achieve a certain degree of robustness against corruptions in a cloud computing IaaS software stack, including when the corruptions may come from the lowest hyper vision layer.