* Watchdogs
* Timeouts on dangerous states
* Stack overflow checks
* Firmware CRC boot/background computation
* Persistant data (eg calib params in flash) CRCs
* Analog switch (resistance error band)
* Integration of measurements
* Reliable, error-detecting communications protocols
* Safe scripting control
* Crypto -authenticate, integrity check
* Handshaking (multistep) protocols enabling dangerous states
* Self calibrating measurements
* Error detection on measurements
* Alarm strategy
* Single point failure tolerance
* Elec. isolation
* No energized human-accessible pins (UL)