Semantic Clone Detection for Model-Based Development of Embedded Systems

  • Bakr Al-Batran
  • Bernhard Schätz
  • Benjamin Hummel
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6981)


With model-based development becoming an increasingly common development methodology in embedded systems engineering, models have become an important asset of the the software development process. Therefore, techniques for the automatic detection of clones in those models have been developed to improve their maintainability. As these approaches currently only consider syntactic clones, the detection of clones is limited to syntactically equivalent copies. Using the concept of normal forms, these approaches can be extended to also cover semantic clones with identical behavior but different structure. The submission presents a generalized concept of clones for Simulink models, describes a pattern-based normal-form approach, and discusses results of the application of an implementation of this approach.


Normal Form Transformation Rule Graph Transformation Model Fragment Clone Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Al-Batran, B.: Model-Based Clone Detection Using Normal Forms. Master’s thesis, Technische Universität München (2011)Google Scholar
  2. 2.
    Deissenboeck, F., Hummel, B., Jürgens, E., Pfähler, M., Schätz, B.: Model clone detection in practice. In: International Workshop on Software Clones, IWSC 2010, pp. 57–64. ACM, New York (2010), Google Scholar
  3. 3.
    Deissenboeck, F., Hummel, B., Jürgens, E., Schätz, B., Wagner, S., Girard, J.F., Teuchert, S.: Clone Detection in Automotive Model-Based Development. In: International Conference on Software Engineering (2008)Google Scholar
  4. 4.
    Ehrig, H., Ehrig, K., de Lara, J., Taentzer, G., Varró, D., Varró-Gyapay, S.: Termination criteria for model transformation. In: Cerioli, M. (ed.) FASE 2005. LNCS, vol. 3442, pp. 49–63. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Gabel, M., Jiang, L., Su, Z.: Scalable detection of semantic clones. In: International Conference on Software Engineering, pp. 321–330 (2008)Google Scholar
  6. 6.
    Gerth, C., Luckey, M., Kuster, J.M., Engels, G.: Detection of Semantically Equivalent Fragments for Business Process Model Change Management. In: International Conference on Services Computing, pp. 57–64. IEEE Computer Society, Los Alamitos (2010)Google Scholar
  7. 7.
    dSpace GmbH: TargetLink Production Code Generation,
  8. 8.
    Krinke, J.: Identifying similar code with program dependence graphs. In: WCRE 2001 (2001)Google Scholar
  9. 9.
    Pham, N.H., Nguyen, H.A., Nguyen, T.T., Al-Kofahi, J.M., Nguyen, T.N.: Complete and accurate clone detection in graph-based models. In: International Conference on Software Engineering, pp. 276–286. IEEE Computer Society, Los Alamitos (2009)Google Scholar
  10. 10.
    Plump, D.: Termination of graph rewriting is undecidable. Fundam. Inf. 33, 201–209 (1998), zbMATHMathSciNetGoogle Scholar
  11. 11.
    Plump, D.: Confluence of graph transformation revisited. In: Middeldorp, A., van Oostrom, V., van Raamsdonk, F., de Vrijer, R. (eds.) Processes, Terms and Cycles: Steps on the Road to Infinity. LNCS, vol. 3838, pp. 280–308. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Roy, C.K., Cordy, J.R.: A survey on software clone detection research. Tech. rep., Queen’s University, Canada (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Bakr Al-Batran
    • 1
  • Bernhard Schätz
    • 1
  • Benjamin Hummel
    • 2
  1. 1.fortiss GmbH, MünchenGermany
  2. 2.Fakultät für InformatikTechnische Universität MünchenGermany

Personalised recommendations