Have you seen Project T-TEE: From Trusted to Trustless Execution Environments ?
We could use your help there