Rene has purchased new antivirus software. This software has an added feature, where it can execute suspicious files in a virtual environment. If the file is safe, the software will permit Rene to execute the program in real time. Which detection method does Rene’s software employ?