>> Safety critical sofware has a lot of overlap with the requirements >> for high security software. > Can anyone think of any _differences_ between those domain (process > and code-wise, not regulatory-wise).
Process-wise, probably not. In each case, you need to start by figuring out what your threat model is and what suitable responses are to the various possibilities, and take it from there. Code-wise, there will often be relatively large differences, but those follow directly from fairly basic differences in the threat models and response strategies. /~\ The ASCII der Mouse \ / Ribbon Campaign X Against HTML [EMAIL PROTECTED] / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B