This document proposes identifying buffer overflow inducing loops (BOILs) in binary code as a pattern for detecting buffer overflow vulnerabilities. A BOIL is a loop that writes to memory, where the written address and value change within the loop and depend on function arguments. The authors implemented a tool to detect BOILs using data flow analysis. Experimental results on vulnerable programs found BOILs flagged 10-15% of loops and successfully identified known vulnerabilities. Future work involves integrating BOIL detection into a full vulnerability analysis framework.